Bug 2268138 - RHDS LDAP server Segmentation fault, apparent heap corruption, crashes in OpenSSL after SSL_do_handshake [11.7.z]
Summary: RHDS LDAP server Segmentation fault, apparent heap corruption, crashes in Ope...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Directory Server
Classification: Red Hat
Component: 389-ds-base
Version: 11.7
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: DS11.7
: dirsrv-11.7
Assignee: LDAP Maintainers
QA Contact: LDAP QA Team
Evgenia Martynyuk
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-03-06 11:34 UTC by Viktor Ashirov
Modified: 2024-03-22 08:33 UTC (History)
3 users (show)

Fixed In Version: 389-ds-base-1.4.3.34-3.module+el8dsrv+21391+b62d2223
Doc Type: Bug Fix
Doc Text:
.The `ns-slapd` binary is now linked with the thread-safe `libldap_r` library, no longer causing segmentation fault An upstream change in the build system introduced a regression by linking the `ns-slapd` binary with the non thread-safe `libldap` library instead of the thread-safe `libldap_r`. Consequently, the `ns-slapd` process could fail with a segmentation fault. This update fixes the problem with the build system code and the `ns-slapd` binary is now linked back with the thread-safe `libldap_r` library. As a result, the segmentation fault no longer occurs.
Clone Of:
Environment:
Last Closed: 2024-03-19 11:26:50 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker IDMDS-4216 0 None None None 2024-03-06 14:45:15 UTC
Red Hat Issue Tracker IDMDS-4226 0 None None None 2024-03-11 15:01:55 UTC
Red Hat Product Errata RHSA-2024:1372 0 None None None 2024-03-19 11:26:51 UTC

Comment 7 errata-xmlrpc 2024-03-19 11:26:50 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: redhat-ds:11 security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2024:1372


Note You need to log in before you can comment on or make changes to this bug.