Description of problem: Previously: https://bugzilla.redhat.com/show_bug.cgi?id=1952907 This issue is not fixed completely and can be triggered by supplying a malformed cookie, for example -E sync=rp/foo Thread 14 "ns-slapd" received signal SIGSEGV, Segmentation fault. 0x00007f7802ba38d6 in __strcmp_evex () from target:/lib64/libc.so.6 (gdb) bt #0 0x00007f7802ba38d6 in __strcmp_evex () at target:/lib64/libc.so.6 #1 0x00007f77fe926e9f in sync_cookie_isvalid (refcookie=0x7f77febfaba0, testcookie=0x7f77febfab80) at ldap/servers/plugins/sync/sync_util.c:796 #2 sync_cookie_isvalid (testcookie=0x7f77febfab80, refcookie=0x7f77febfaba0) at ldap/servers/plugins/sync/sync_util.c:789 #3 0x00007f77fe92aa7d in sync_srch_refresh_pre_search (pb=0x7f77feb9fd00) at ldap/servers/plugins/sync/sync_refresh.c:135 #4 0x00007f7802e297d9 in plugin_call_func (list=0x7f77fe9ed800, operation=operation@entry=403, pb=pb@entry=0x7f77feb9fd00, call_one=call_one@entry=0) at ldap/servers/slapd/plugin.c:2001 #5 0x00007f7802e299e6 in plugin_call_list (pb=0x7f77feb9fd00, operation=403, list=<optimized out>) at ldap/servers/slapd/plugin.c:1944 #6 plugin_call_plugins (pb=0x7f77feb9fd00, whichfunction=403) at ldap/servers/slapd/plugin.c:414 #7 0x00007f7802e222a9 in op_shared_search (pb=pb@entry=0x7f77feb9fd00, send_result=send_result@entry=1) at ldap/servers/slapd/opshared.c:586 #8 0x0000556eb3f0db14 in do_search (pb=<optimized out>) at ldap/servers/slapd/search.c:388 #9 0x0000556eb3efcb7f in connection_dispatch_operation (pb=0x7f77feb9fd00, op=<optimized out>, conn=<optimized out>) at ldap/servers/slapd/connection.c:659 #10 connection_threadmain () at ldap/servers/slapd/connection.c:1785 #11 0x00007f780290ec34 in _pt_root () at target:/lib64/libnspr4.so #12 0x00007f7802b75802 in start_thread () at target:/lib64/libc.so.6 #13 0x00007f7802b15450 in clone3 () at target:/lib64/libc.so.6 Automated reproducer: https://github.com/389ds/389-ds-base/blob/main/dirsrvtests/tests/tickets/ticket48013_test.py Version-Release number of selected component (if applicable): 389-ds-base-2.0.x+ (earliest I was able to test was 2.0.5). How reproducible: Deterministically Steps to Reproduce: 1. https://github.com/389ds/389-ds-base/blob/main/dirsrvtests/tests/tickets/ticket48013_test.py Actual results: Server crashes Expected results: Should return an error that the cookie is invalid and not crash. Additional info: Upstream ticket: https://github.com/389ds/389-ds-base/issues/4711#issuecomment-1205100979
Created 389-ds-base tracking bugs for this issue: Affects: fedora-35 [bug 2118761] Affects: fedora-36 [bug 2118762]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:7087 https://access.redhat.com/errata/RHSA-2022:7087
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7133 https://access.redhat.com/errata/RHSA-2022:7133
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8162 https://access.redhat.com/errata/RHSA-2022:8162
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:8680 https://access.redhat.com/errata/RHSA-2022:8680
This issue has been addressed in the following products: Red Hat Directory Server 11.5 for RHEL 8 Via RHSA-2022:8886 https://access.redhat.com/errata/RHSA-2022:8886
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2022:8976 https://access.redhat.com/errata/RHSA-2022:8976
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2850
This issue has been addressed in the following products: Red Hat Directory Server 12.0 for RHEL 9 Via RHSA-2023:0479 https://access.redhat.com/errata/RHSA-2023:0479