| Summary: | Qpid AMQP daemon fails to load after latest updates | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 5 | Reporter: | Justin Ross <jross> | ||||
| Component: | nss | Assignee: | Elio Maldonado Batiz <emaldona> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Aleš Mareček <amarecek> | ||||
| Severity: | high | Docs Contact: | |||||
| Priority: | high | ||||||
| Version: | 5.8 | CC: | amarecek, bgollahe, jneedle, jross, kengert, lzhaldyb, o.h.weiergraeber, sgraf, syeghiay, thoger | ||||
| Target Milestone: | rc | Keywords: | ZStream | ||||
| Target Release: | 5.8 | ||||||
| Hardware: | x86_64 | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | nss-3.13.1-4.el5 | Doc Type: | Bug Fix | ||||
| Doc Text: |
Cause: Some packages call nss without initializing as mandated by the API and nss did not protect itself against such improper usage.
Consequence: This caused crashes on shutdown as some variables haven't been properly initialized. Such crashes were reported in the messaging daemon (qpidd) included in Red Hat Enterprise MRG after a recent update to nss. This occurred as qpidd made nss calls before initializing nss.
Fix: Wit this fix nss now protects itself against potential improper use by client code.
Result: With this update nss prevents qpidd, and other affected processes that may call nss without initializing as mandated by the API, from crashing
|
Story Points: | --- | ||||
| Clone Of: | 797426 | ||||||
| : | 797959 (view as bug list) | Environment: | |||||
| Last Closed: | 2013-01-08 07:38:45 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Bug Depends On: | 797426 | ||||||
| Bug Blocks: | 797959, 798462 | ||||||
| Attachments: |
|
||||||
|
Comment 2
Leonid Zhaldybin
2012-02-27 18:24:53 UTC
Comment #2 was related to a build of qpid-cpp that had a fix. We have since deferred that fix and will instead wait for an updated nss. Created attachment 566380 [details] Protect NSS_Shutdown against clients that don't initialize nss This patch is identical to the one approved for Bug 797426. Comment on attachment 566380 [details]
Protect NSS_Shutdown against clients that don't initialize nss
yes, this patch is the same patch as in the other bug.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-0081.html |