Bug 797939

Summary: Qpid AMQP daemon fails to load after latest updates
Product: Red Hat Enterprise Linux 5 Reporter: Justin Ross <jross>
Component: nssAssignee: Elio Maldonado Batiz <emaldona>
Status: CLOSED ERRATA QA Contact: Aleš Mareček <amarecek>
Severity: high Docs Contact:
Priority: high    
Version: 5.8CC: amarecek, bgollahe, jneedle, jross, kengert, lzhaldyb, o.h.weiergraeber, sgraf, syeghiay, thoger
Target Milestone: rcKeywords: ZStream
Target Release: 5.8   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: nss-3.13.1-4.el5 Doc Type: Bug Fix
Doc Text:
Cause: Some packages call nss without initializing as mandated by the API and nss did not protect itself against such improper usage. Consequence: This caused crashes on shutdown as some variables haven't been properly initialized. Such crashes were reported in the messaging daemon (qpidd) included in Red Hat Enterprise MRG after a recent update to nss. This occurred as qpidd made nss calls before initializing nss. Fix: Wit this fix nss now protects itself against potential improper use by client code. Result: With this update nss prevents qpidd, and other affected processes that may call nss without initializing as mandated by the API, from crashing
Story Points: ---
Clone Of: 797426
: 797959 (view as bug list) Environment:
Last Closed: 2013-01-08 07:38:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 797426    
Bug Blocks: 797959, 798462    
Attachments:
Description Flags
Protect NSS_Shutdown against clients that don't initialize nss kengert: review+

Comment 2 Leonid Zhaldybin 2012-02-27 18:24:53 UTC
The problem seems to be fixed. Tested on RHEL5.7 and RHEL5.8 (i386 and x86_64).
Packages used for testing:

python-qpid-0.10-1.el5
python-qpid-qmf-0.10-11.el5
qpid-cpp-client-0.10-10.el5
qpid-cpp-client-devel-0.10-10.el5
qpid-cpp-client-devel-docs-0.10-10.el5
qpid-cpp-client-rdma-0.10-10.el5
qpid-cpp-client-ssl-0.10-10.el5
qpid-cpp-mrg-debuginfo-0.10-10.el5
qpid-cpp-server-0.10-10.el5
qpid-cpp-server-cluster-0.10-10.el5
qpid-cpp-server-devel-0.10-10.el5
qpid-cpp-server-rdma-0.10-10.el5
qpid-cpp-server-ssl-0.10-10.el5
qpid-cpp-server-store-0.10-10.el5
qpid-cpp-server-xml-0.10-10.el5
qpid-qmf-0.10-11.el5
qpid-tools-0.10-6.el5
rh-qpid-cpp-tests-0.10-10.el5

-> VERIFIED

Comment 4 Jeff Needle 2012-02-28 18:12:54 UTC
Comment #2 was related to a build of qpid-cpp that had a fix.  We have since deferred that fix and will instead wait for an updated nss.

Comment 5 Elio Maldonado Batiz 2012-02-28 19:02:39 UTC
Created attachment 566380 [details]
Protect NSS_Shutdown against clients that don't initialize nss

This patch is identical to the one approved for Bug 797426.

Comment 6 Kai Engert (:kaie) (inactive account) 2012-02-28 19:54:31 UTC
Comment on attachment 566380 [details]
Protect NSS_Shutdown against clients that don't initialize nss

yes, this patch is the same patch as in the other bug.

Comment 12 errata-xmlrpc 2013-01-08 07:38:45 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2013-0081.html