Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Cause:
Using Perl LDAP client with SASL authentication mechanism.
Consequence:
LDAP server can receive corrupted LDAP queries.
Fix:
Net::LDAP Perl module was fixed to pass actual query
length instead of fixed 1500 bytes to the syswrite()
function which can be redefined by other protocol layers,
like SASL authentication implementation.
Result:
Net::LDAP client does not corrupt sent LDAP queries.
I am not able to reproduce this bug against ipa-server which I used for reproducing bug 1104069 in rhel6, using bad_sasl.pl program, there are a lot of changes in a lot of components between RHEL6 and RHEL7, but the code in perl-LDAP is the same.
+++ This bug was initially created as a clone of Bug #1104069 +++
Description of problem:
perl-LDAP sets wrong length for function _sendmesg and this may cause error in function WRITE in perl-Authen-SASL when length of message is shorter than length. This bug is related with bug described in this bug report https://bugzilla.redhat.com/show_bug.cgi?id=965739.
Version-Release number of selected component (if applicable):
perl-LDAP-0.40-1.el6
How reproducible:
Steps to Reproduce:
Steps how to reproduce this bug are described in bug report for bug 965739. It is needed to use specific version of some packages.
389-ds-base-1.2.11.15-X.el6 where X is less than 22 or use Z-stream version of this package for rhel6.4. I use 389-ds-base-1.2.11.15-22.el6_4.
perl-Authen-SASL-2.13-2.el6
Actual results:
Program bad_sasl.pl from bug report for bug 965739 fails.
Expected results:
No fails.
Additional info:
Patch is added as an attachment.
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory, and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.
https://rhn.redhat.com/errata/RHBA-2015-0333.html