Hide Forgot
This bug has been copied from bug #717738 and has been proposed to be backported to 6.1 z-stream (EUS).
Fixed in openldap-2.4.23-15.el6_1.1
Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: -
Technical note updated. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. Diffed Contents: @@ -1 +1,4 @@ --+- Any tool which uses both OpenLDAP and Mozilla NSS libraries. OpenLDAP validates TLS peer and the certificate is cached by Mozilla NSS library. +- The tool can fail on NSS_Shutdown function call, because the client certificate is not freed and the caches cannot be destroyed. +- Peer certificate is freed in OpenLDAP library after certificate validation is finished. +- All caches can be freed and NSS_Shutdown succeeds.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2011-1124.html
*** Bug 790916 has been marked as a duplicate of this bug. ***