Skip to navigation

Bug Fix Advisory nss_ldap bug fix update

Advisory: RHBA-2011:0514-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-05-18
Last updated on: 2011-05-18
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)

Details

An updated nss_ldap package that fixes a bug is now available for Red Hat
Enterprise Linux 5.

[Updated 20 May 2011]
This advisory has been updated with the correct product name (that is, Red Hat
Enterprise Linux 5) in the Details section. The package included in this revised
update has not been changed in any way from the package included in the original
advisory.

The nss_ldap package contains nss_ldap, a module which allows applications to
retrieve information about users, groups, netgroups, from directory servers, and
pam_ldap, which allows PAM-aware applications to check users passwords with the
aid of a directory server.

This updated nss_ldap package fixes the following bug:

* Previously, if the server closed the connection, the client did not receive
any results and failed with the following error, which was caused by the client
attempting to parse results which it had not received:

ldap_result: Assertion `ld != ((void *)0)' failed.

With this update, the nss_ldap checks if the server is available while running
and finishes with an appropriate error code if the connection fails. (BZ#703831)

All users of nss_ldap are advised to upgrade to this updated package, which
resolves this bug.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
nss_ldap-253-37.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0251
    MD5: 397a13ed2059a788d4c567f0774992d3
SHA-256: a2bb799582a1df73c1e17a2cb3b9ab3b108e8ef708c4fa2bea9537828c412b25
 
IA-32:
nss_ldap-253-37.el5_6.1.i386.rpm
File outdated by:  RHBA-2013:0251
    MD5: 672240f709c57172307b6e5397e0ac1f
SHA-256: 3763ba7c2a80c6c9016df32ab2f09d2afa614556a5d88e330e278863a1b63324
 
IA-64:
nss_ldap-253-37.el5_6.1.i386.rpm
File outdated by:  RHBA-2013:0251
    MD5: 672240f709c57172307b6e5397e0ac1f
SHA-256: 3763ba7c2a80c6c9016df32ab2f09d2afa614556a5d88e330e278863a1b63324
nss_ldap-253-37.el5_6.1.ia64.rpm
File outdated by:  RHBA-2013:0251
    MD5: d2c719ec561ce3fff344be05a62b7730
SHA-256: 5be545099fdefc59092b1db72499318dd9e2113d9745925b0fdf13f0b38557ed
 
PPC:
nss_ldap-253-37.el5_6.1.ppc.rpm
File outdated by:  RHBA-2013:0251
    MD5: 57c35aa161114f8bd51e5d26d7c7656c
SHA-256: 6a5931658d4c6275bcc6dfc9c9dc6940997440830f93acf74c45b06b6ba966cd
nss_ldap-253-37.el5_6.1.ppc64.rpm
File outdated by:  RHBA-2013:0251
    MD5: 7e030422da7f5e9e66fb8fc0de709d5d
SHA-256: 5e5498caa92f5ed58b4b02f628bf5b5ad1a519ef1fd2bdf4245e345f7f2c80c2
 
s390x:
nss_ldap-253-37.el5_6.1.s390.rpm
File outdated by:  RHBA-2013:0251
    MD5: 9d22fbd54b8f69dc7d89092dc86de13c
SHA-256: 0a06c5ad3617346ccd59b8c0a163ff48b52020f9ad893ab05522a649e355af9e
nss_ldap-253-37.el5_6.1.s390x.rpm
File outdated by:  RHBA-2013:0251
    MD5: 952c803a3775b219375223f27b8aeb59
SHA-256: afecab1a6db63fc297c351a7ae4747e3ed83018975c188a56d5e4ed85bdc613c
 
x86_64:
nss_ldap-253-37.el5_6.1.i386.rpm
File outdated by:  RHBA-2013:0251
    MD5: 672240f709c57172307b6e5397e0ac1f
SHA-256: 3763ba7c2a80c6c9016df32ab2f09d2afa614556a5d88e330e278863a1b63324
nss_ldap-253-37.el5_6.1.x86_64.rpm
File outdated by:  RHBA-2013:0251
    MD5: 7d81429edcf6151f185807792a70e672
SHA-256: 53a802cc01abca44f77b2dfa20b12f4ddcc070f8f32f3ac8c844203646cef369
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
nss_ldap-253-37.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0251
    MD5: 397a13ed2059a788d4c567f0774992d3
SHA-256: a2bb799582a1df73c1e17a2cb3b9ab3b108e8ef708c4fa2bea9537828c412b25
 
IA-32:
nss_ldap-253-37.el5_6.1.i386.rpm
File outdated by:  RHBA-2013:0251
    MD5: 672240f709c57172307b6e5397e0ac1f
SHA-256: 3763ba7c2a80c6c9016df32ab2f09d2afa614556a5d88e330e278863a1b63324
 
x86_64:
nss_ldap-253-37.el5_6.1.i386.rpm
File outdated by:  RHBA-2013:0251
    MD5: 672240f709c57172307b6e5397e0ac1f
SHA-256: 3763ba7c2a80c6c9016df32ab2f09d2afa614556a5d88e330e278863a1b63324
nss_ldap-253-37.el5_6.1.x86_64.rpm
File outdated by:  RHBA-2013:0251
    MD5: 7d81429edcf6151f185807792a70e672
SHA-256: 53a802cc01abca44f77b2dfa20b12f4ddcc070f8f32f3ac8c844203646cef369
 
Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
nss_ldap-253-37.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0251
    MD5: 397a13ed2059a788d4c567f0774992d3
SHA-256: a2bb799582a1df73c1e17a2cb3b9ab3b108e8ef708c4fa2bea9537828c412b25
 
IA-32:
nss_ldap-253-37.el5_6.1.i386.rpm     MD5: 672240f709c57172307b6e5397e0ac1f
SHA-256: 3763ba7c2a80c6c9016df32ab2f09d2afa614556a5d88e330e278863a1b63324
 
IA-64:
nss_ldap-253-37.el5_6.1.i386.rpm     MD5: 672240f709c57172307b6e5397e0ac1f
SHA-256: 3763ba7c2a80c6c9016df32ab2f09d2afa614556a5d88e330e278863a1b63324
nss_ldap-253-37.el5_6.1.ia64.rpm     MD5: d2c719ec561ce3fff344be05a62b7730
SHA-256: 5be545099fdefc59092b1db72499318dd9e2113d9745925b0fdf13f0b38557ed
 
PPC:
nss_ldap-253-37.el5_6.1.ppc.rpm     MD5: 57c35aa161114f8bd51e5d26d7c7656c
SHA-256: 6a5931658d4c6275bcc6dfc9c9dc6940997440830f93acf74c45b06b6ba966cd
nss_ldap-253-37.el5_6.1.ppc64.rpm     MD5: 7e030422da7f5e9e66fb8fc0de709d5d
SHA-256: 5e5498caa92f5ed58b4b02f628bf5b5ad1a519ef1fd2bdf4245e345f7f2c80c2
 
s390x:
nss_ldap-253-37.el5_6.1.s390.rpm     MD5: 9d22fbd54b8f69dc7d89092dc86de13c
SHA-256: 0a06c5ad3617346ccd59b8c0a163ff48b52020f9ad893ab05522a649e355af9e
nss_ldap-253-37.el5_6.1.s390x.rpm     MD5: 952c803a3775b219375223f27b8aeb59
SHA-256: afecab1a6db63fc297c351a7ae4747e3ed83018975c188a56d5e4ed85bdc613c
 
x86_64:
nss_ldap-253-37.el5_6.1.i386.rpm     MD5: 672240f709c57172307b6e5397e0ac1f
SHA-256: 3763ba7c2a80c6c9016df32ab2f09d2afa614556a5d88e330e278863a1b63324
nss_ldap-253-37.el5_6.1.x86_64.rpm     MD5: 7d81429edcf6151f185807792a70e672
SHA-256: 53a802cc01abca44f77b2dfa20b12f4ddcc070f8f32f3ac8c844203646cef369
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
nss_ldap-253-37.el5_6.1.src.rpm
File outdated by:  RHBA-2013:0251
    MD5: 397a13ed2059a788d4c567f0774992d3
SHA-256: a2bb799582a1df73c1e17a2cb3b9ab3b108e8ef708c4fa2bea9537828c412b25
 
IA-32:
nss_ldap-253-37.el5_6.1.i386.rpm     MD5: 672240f709c57172307b6e5397e0ac1f
SHA-256: 3763ba7c2a80c6c9016df32ab2f09d2afa614556a5d88e330e278863a1b63324
 
IA-64:
nss_ldap-253-37.el5_6.1.i386.rpm     MD5: 672240f709c57172307b6e5397e0ac1f
SHA-256: 3763ba7c2a80c6c9016df32ab2f09d2afa614556a5d88e330e278863a1b63324
nss_ldap-253-37.el5_6.1.ia64.rpm     MD5: d2c719ec561ce3fff344be05a62b7730
SHA-256: 5be545099fdefc59092b1db72499318dd9e2113d9745925b0fdf13f0b38557ed
 
x86_64:
nss_ldap-253-37.el5_6.1.i386.rpm     MD5: 672240f709c57172307b6e5397e0ac1f
SHA-256: 3763ba7c2a80c6c9016df32ab2f09d2afa614556a5d88e330e278863a1b63324
nss_ldap-253-37.el5_6.1.x86_64.rpm     MD5: 7d81429edcf6151f185807792a70e672
SHA-256: 53a802cc01abca44f77b2dfa20b12f4ddcc070f8f32f3ac8c844203646cef369
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

703831 - Using 'getgrent_r' call yields "ldap_result: Assertion `ld != ((void *)0)' failed."



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/