| Summary: | nss_ldap segfaults because of memory corruption | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 5 | Reporter: | Ondrej Moriš <omoris> |
| Component: | nss_ldap | Assignee: | Jakub Hrozek <jhrozek> |
| Status: | CLOSED ERRATA | QA Contact: | Ondrej Moriš <omoris> |
| Severity: | urgent | Docs Contact: | |
| Priority: | high | ||
| Version: | 5.8 | CC: | amarecek, azelinka, dpal, dspurek, jhrozek, jplans, prc, psplicha |
| Target Milestone: | beta | Keywords: | Regression, TestBlocker |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | nss_ldap-253-49.el5 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2012-02-21 06:38:59 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Bug Depends On: | |||
| Bug Blocks: | 741419, 758797 | ||
|
Description
Ondrej Moriš
2011-11-24 14:31:13 UTC
This issue is indeed caused by the parsing patch. Historically, nss_ldap never freed memory. In the patch, I attempted to free /all/ allocated memory, not just the allocations I did in the patch. Please dev_ack+ - I'll either fix the free calls or revert to the old behavior of not freeing memory. Any case, we won't be worse than what nss_ldap did in 5.7 Testing instructions: * install bind-utils, bind-chroot, latest openldap*, latest nss_ldap * wget http://nest.test.redhat.com/mnt/qa/scratch/omoris/reproducer/ * make -C reproducer run * when prompt "[test] " will pop-up, your testing environment is ready * when you finish testing, just exist spawned shell (C-D / logout) * test will bring a system into previous state *** Bug 757172 has been marked as a duplicate of this bug. *** This should better be included in nss_ldap 5.8 errata as soon as possible since it is blocking DNS SRV support which is claimed to appear in Beta (12-07?). Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2012-0268.html |