Skip to navigation

Bug Fix Advisory 389-ds-base bug fix update

Advisory: RHBA-2012:0049-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-01-23
Last updated on: 2012-01-23
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated 389-ds-base packages that fix multiple bugs are now available for Red
Hat Enterprise Linux 6.

The 389-ds-base packages provide 389 Directory Server, which is an LDAPv3
compliant server. The base packages include the Lightweight Directory Access
Protocol (LDAP) server and command-line utilities for server administration.

This update fixes the following bugs:

* When the LDAP server was under a heavy load, and the network was congested,
client connections could experience problems. If there was a connection problem
while the server was sending Simple Paged Result (SPR) search results to the
client, the LDAP server called a cleanup routine incorrectly. This led to a
memory leak and the server terminated unexpectedly. With this update, the
underlying code has been modified to ensure that cleanup tasks are run correctly
and memory leaks no longer occur. The LDAP server no longer crashes in this
scenario. (BZ#758682)

* Previously, certain operations with the Change Sequence Number (CSN) were not
very effective in 389 Directory Server. Therefore, performing a large number of
the modrdn operations during Directory Server content replications led to poor
performance, and the ns-slapd daemon consumed up to 100% CPU under these
circumstances. With this update, the underlying code has been modified to use
these CSN operations efficiently so that replications in Directory Server now
work as expected in this scenario. (BZ#758683)

* Previously, allocated memory was not correctly released in the underlying code
for the SASL GSSAPI authentication method, when checking the Simple
Authentication and Security Layer (SASL) identity mappings. This problem could
cause memory leaks when processing SASL bind requests, which eventually caused
the LDAP server to terminate unexpectedly with a segmentation fault. This update
adds function calls that are needed to free allocated memory correctly. Memory
leaks no longer occur and the LDAP server no longer crashes in this scenario.
(BZ#758688)

* Previously, 389 Directory Server used the Netscape Portable Runtime (NSPR)
implementation of the read/write locking mechanism. This implementation allowed
deadlocks to occur if 389 Directory Server was under a heavy load, which caused
the server to become unresponsive. With this update, 389 Directory Server now
uses the POSIX implementation of the locking mechanism, and deadlocks no longer
occur under a heavy load. (BZ#771631)

* Under a heavy load in replicated environments, 389 Directory Server did not
handle the Entry USN index correctly. Consequently, the index could become out
of sync with the main database and search operations on USN entries returned
incorrect results. This update modifies the Entry USN plug-in and 389 Directory
Server now handles the Entry USN index as expected. (BZ#771632)

All users of 389-ds-base are advised to upgrade to these updated packages, which
fix these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
389-ds-base-1.2.9.14-1.el6_2.2.src.rpm
File outdated by:  RHSA-2014:0292
    MD5: ba71a113b9568f8adcfec99c52200c9b
SHA-256: 3e311c26544b5371e176763f7f0bb054aa0ab1805ea5275bbf78b8bbcfcf5d01
 
IA-32:
389-ds-base-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: 35b286deec67802abe302e1a6f1bcee9
SHA-256: 0fe48d520a0fd825f1eb9a694415c7068f2f4b62a232e1bd815dc99530d3374c
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ee97c2592f1a468f63f9f0794a56c1ff
SHA-256: 07e55ad7a567a41b65ca20c3b0635f1dd0e799a9a3a3d9ecb496a56e98822ee6
389-ds-base-devel-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ab9e66791e5f940119d787eeb78f5866
SHA-256: bfd68d20ae18952e98d2c5942f1f21298b9bc2b1593b1f2d1ea45b56fe4bce67
389-ds-base-libs-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: 73e6f489d5422eb656a647681dc4cadf
SHA-256: 5476776f692e5b508c26efe0036d461c34d69d0eefa407bf975ecc97ab49109a
 
x86_64:
389-ds-base-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 31cbf2f67651b03d10806d71c18079d7
SHA-256: 6bc8449d3a6cdbd81673a55fc4d3a417996f151900d3ddb337e9f396d40e44fa
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ee97c2592f1a468f63f9f0794a56c1ff
SHA-256: 07e55ad7a567a41b65ca20c3b0635f1dd0e799a9a3a3d9ecb496a56e98822ee6
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: c3dec2283a86106c23f20f39e6c45236
SHA-256: 10ef0c0019176130823bb51fcdd25e9ad977173e68f2b1a2f4d7406bc2a56a86
389-ds-base-devel-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ab9e66791e5f940119d787eeb78f5866
SHA-256: bfd68d20ae18952e98d2c5942f1f21298b9bc2b1593b1f2d1ea45b56fe4bce67
389-ds-base-devel-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 25604f67bd3dc7ef7c75e8ed588e3516
SHA-256: e10a8a45c502d83dc1354ff0501c708932d964e8d19e601bdc3178f9caa3caf1
389-ds-base-libs-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: 73e6f489d5422eb656a647681dc4cadf
SHA-256: 5476776f692e5b508c26efe0036d461c34d69d0eefa407bf975ecc97ab49109a
389-ds-base-libs-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 84fe2303c5b9713de3a7fa2ca9b432a9
SHA-256: 11be2aac7c1fedcc5a52eeb16f65e13344bade95705fb4608f2254ca3bfb5135
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
389-ds-base-1.2.9.14-1.el6_2.2.src.rpm
File outdated by:  RHSA-2014:0292
    MD5: ba71a113b9568f8adcfec99c52200c9b
SHA-256: 3e311c26544b5371e176763f7f0bb054aa0ab1805ea5275bbf78b8bbcfcf5d01
 
x86_64:
389-ds-base-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 31cbf2f67651b03d10806d71c18079d7
SHA-256: 6bc8449d3a6cdbd81673a55fc4d3a417996f151900d3ddb337e9f396d40e44fa
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ee97c2592f1a468f63f9f0794a56c1ff
SHA-256: 07e55ad7a567a41b65ca20c3b0635f1dd0e799a9a3a3d9ecb496a56e98822ee6
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: c3dec2283a86106c23f20f39e6c45236
SHA-256: 10ef0c0019176130823bb51fcdd25e9ad977173e68f2b1a2f4d7406bc2a56a86
389-ds-base-devel-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ab9e66791e5f940119d787eeb78f5866
SHA-256: bfd68d20ae18952e98d2c5942f1f21298b9bc2b1593b1f2d1ea45b56fe4bce67
389-ds-base-devel-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 25604f67bd3dc7ef7c75e8ed588e3516
SHA-256: e10a8a45c502d83dc1354ff0501c708932d964e8d19e601bdc3178f9caa3caf1
389-ds-base-libs-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: 73e6f489d5422eb656a647681dc4cadf
SHA-256: 5476776f692e5b508c26efe0036d461c34d69d0eefa407bf975ecc97ab49109a
389-ds-base-libs-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 84fe2303c5b9713de3a7fa2ca9b432a9
SHA-256: 11be2aac7c1fedcc5a52eeb16f65e13344bade95705fb4608f2254ca3bfb5135
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
389-ds-base-1.2.9.14-1.el6_2.2.src.rpm
File outdated by:  RHSA-2014:0292
    MD5: ba71a113b9568f8adcfec99c52200c9b
SHA-256: 3e311c26544b5371e176763f7f0bb054aa0ab1805ea5275bbf78b8bbcfcf5d01
 
IA-32:
389-ds-base-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: 35b286deec67802abe302e1a6f1bcee9
SHA-256: 0fe48d520a0fd825f1eb9a694415c7068f2f4b62a232e1bd815dc99530d3374c
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ee97c2592f1a468f63f9f0794a56c1ff
SHA-256: 07e55ad7a567a41b65ca20c3b0635f1dd0e799a9a3a3d9ecb496a56e98822ee6
389-ds-base-devel-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ab9e66791e5f940119d787eeb78f5866
SHA-256: bfd68d20ae18952e98d2c5942f1f21298b9bc2b1593b1f2d1ea45b56fe4bce67
389-ds-base-libs-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: 73e6f489d5422eb656a647681dc4cadf
SHA-256: 5476776f692e5b508c26efe0036d461c34d69d0eefa407bf975ecc97ab49109a
 
x86_64:
389-ds-base-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 31cbf2f67651b03d10806d71c18079d7
SHA-256: 6bc8449d3a6cdbd81673a55fc4d3a417996f151900d3ddb337e9f396d40e44fa
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ee97c2592f1a468f63f9f0794a56c1ff
SHA-256: 07e55ad7a567a41b65ca20c3b0635f1dd0e799a9a3a3d9ecb496a56e98822ee6
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: c3dec2283a86106c23f20f39e6c45236
SHA-256: 10ef0c0019176130823bb51fcdd25e9ad977173e68f2b1a2f4d7406bc2a56a86
389-ds-base-devel-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ab9e66791e5f940119d787eeb78f5866
SHA-256: bfd68d20ae18952e98d2c5942f1f21298b9bc2b1593b1f2d1ea45b56fe4bce67
389-ds-base-devel-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 25604f67bd3dc7ef7c75e8ed588e3516
SHA-256: e10a8a45c502d83dc1354ff0501c708932d964e8d19e601bdc3178f9caa3caf1
389-ds-base-libs-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: 73e6f489d5422eb656a647681dc4cadf
SHA-256: 5476776f692e5b508c26efe0036d461c34d69d0eefa407bf975ecc97ab49109a
389-ds-base-libs-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 84fe2303c5b9713de3a7fa2ca9b432a9
SHA-256: 11be2aac7c1fedcc5a52eeb16f65e13344bade95705fb4608f2254ca3bfb5135
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
389-ds-base-1.2.9.14-1.el6_2.2.src.rpm
File outdated by:  RHSA-2014:0292
    MD5: ba71a113b9568f8adcfec99c52200c9b
SHA-256: 3e311c26544b5371e176763f7f0bb054aa0ab1805ea5275bbf78b8bbcfcf5d01
 
x86_64:
389-ds-base-1.2.9.14-1.el6_2.2.x86_64.rpm     MD5: 31cbf2f67651b03d10806d71c18079d7
SHA-256: 6bc8449d3a6cdbd81673a55fc4d3a417996f151900d3ddb337e9f396d40e44fa
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.i686.rpm     MD5: ee97c2592f1a468f63f9f0794a56c1ff
SHA-256: 07e55ad7a567a41b65ca20c3b0635f1dd0e799a9a3a3d9ecb496a56e98822ee6
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.x86_64.rpm     MD5: c3dec2283a86106c23f20f39e6c45236
SHA-256: 10ef0c0019176130823bb51fcdd25e9ad977173e68f2b1a2f4d7406bc2a56a86
389-ds-base-devel-1.2.9.14-1.el6_2.2.i686.rpm     MD5: ab9e66791e5f940119d787eeb78f5866
SHA-256: bfd68d20ae18952e98d2c5942f1f21298b9bc2b1593b1f2d1ea45b56fe4bce67
389-ds-base-devel-1.2.9.14-1.el6_2.2.x86_64.rpm     MD5: 25604f67bd3dc7ef7c75e8ed588e3516
SHA-256: e10a8a45c502d83dc1354ff0501c708932d964e8d19e601bdc3178f9caa3caf1
389-ds-base-libs-1.2.9.14-1.el6_2.2.i686.rpm     MD5: 73e6f489d5422eb656a647681dc4cadf
SHA-256: 5476776f692e5b508c26efe0036d461c34d69d0eefa407bf975ecc97ab49109a
389-ds-base-libs-1.2.9.14-1.el6_2.2.x86_64.rpm     MD5: 84fe2303c5b9713de3a7fa2ca9b432a9
SHA-256: 11be2aac7c1fedcc5a52eeb16f65e13344bade95705fb4608f2254ca3bfb5135
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
389-ds-base-1.2.9.14-1.el6_2.2.src.rpm
File outdated by:  RHSA-2014:0292
    MD5: ba71a113b9568f8adcfec99c52200c9b
SHA-256: 3e311c26544b5371e176763f7f0bb054aa0ab1805ea5275bbf78b8bbcfcf5d01
 
IA-32:
389-ds-base-1.2.9.14-1.el6_2.2.i686.rpm     MD5: 35b286deec67802abe302e1a6f1bcee9
SHA-256: 0fe48d520a0fd825f1eb9a694415c7068f2f4b62a232e1bd815dc99530d3374c
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.i686.rpm     MD5: ee97c2592f1a468f63f9f0794a56c1ff
SHA-256: 07e55ad7a567a41b65ca20c3b0635f1dd0e799a9a3a3d9ecb496a56e98822ee6
389-ds-base-devel-1.2.9.14-1.el6_2.2.i686.rpm     MD5: ab9e66791e5f940119d787eeb78f5866
SHA-256: bfd68d20ae18952e98d2c5942f1f21298b9bc2b1593b1f2d1ea45b56fe4bce67
389-ds-base-libs-1.2.9.14-1.el6_2.2.i686.rpm     MD5: 73e6f489d5422eb656a647681dc4cadf
SHA-256: 5476776f692e5b508c26efe0036d461c34d69d0eefa407bf975ecc97ab49109a
 
x86_64:
389-ds-base-1.2.9.14-1.el6_2.2.x86_64.rpm     MD5: 31cbf2f67651b03d10806d71c18079d7
SHA-256: 6bc8449d3a6cdbd81673a55fc4d3a417996f151900d3ddb337e9f396d40e44fa
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.i686.rpm     MD5: ee97c2592f1a468f63f9f0794a56c1ff
SHA-256: 07e55ad7a567a41b65ca20c3b0635f1dd0e799a9a3a3d9ecb496a56e98822ee6
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.x86_64.rpm     MD5: c3dec2283a86106c23f20f39e6c45236
SHA-256: 10ef0c0019176130823bb51fcdd25e9ad977173e68f2b1a2f4d7406bc2a56a86
389-ds-base-devel-1.2.9.14-1.el6_2.2.i686.rpm     MD5: ab9e66791e5f940119d787eeb78f5866
SHA-256: bfd68d20ae18952e98d2c5942f1f21298b9bc2b1593b1f2d1ea45b56fe4bce67
389-ds-base-devel-1.2.9.14-1.el6_2.2.x86_64.rpm     MD5: 25604f67bd3dc7ef7c75e8ed588e3516
SHA-256: e10a8a45c502d83dc1354ff0501c708932d964e8d19e601bdc3178f9caa3caf1
389-ds-base-libs-1.2.9.14-1.el6_2.2.i686.rpm     MD5: 73e6f489d5422eb656a647681dc4cadf
SHA-256: 5476776f692e5b508c26efe0036d461c34d69d0eefa407bf975ecc97ab49109a
389-ds-base-libs-1.2.9.14-1.el6_2.2.x86_64.rpm     MD5: 84fe2303c5b9713de3a7fa2ca9b432a9
SHA-256: 11be2aac7c1fedcc5a52eeb16f65e13344bade95705fb4608f2254ca3bfb5135
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
389-ds-base-1.2.9.14-1.el6_2.2.src.rpm
File outdated by:  RHSA-2014:0292
    MD5: ba71a113b9568f8adcfec99c52200c9b
SHA-256: 3e311c26544b5371e176763f7f0bb054aa0ab1805ea5275bbf78b8bbcfcf5d01
 
IA-32:
389-ds-base-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: 35b286deec67802abe302e1a6f1bcee9
SHA-256: 0fe48d520a0fd825f1eb9a694415c7068f2f4b62a232e1bd815dc99530d3374c
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ee97c2592f1a468f63f9f0794a56c1ff
SHA-256: 07e55ad7a567a41b65ca20c3b0635f1dd0e799a9a3a3d9ecb496a56e98822ee6
389-ds-base-devel-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ab9e66791e5f940119d787eeb78f5866
SHA-256: bfd68d20ae18952e98d2c5942f1f21298b9bc2b1593b1f2d1ea45b56fe4bce67
389-ds-base-libs-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: 73e6f489d5422eb656a647681dc4cadf
SHA-256: 5476776f692e5b508c26efe0036d461c34d69d0eefa407bf975ecc97ab49109a
 
x86_64:
389-ds-base-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 31cbf2f67651b03d10806d71c18079d7
SHA-256: 6bc8449d3a6cdbd81673a55fc4d3a417996f151900d3ddb337e9f396d40e44fa
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ee97c2592f1a468f63f9f0794a56c1ff
SHA-256: 07e55ad7a567a41b65ca20c3b0635f1dd0e799a9a3a3d9ecb496a56e98822ee6
389-ds-base-debuginfo-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: c3dec2283a86106c23f20f39e6c45236
SHA-256: 10ef0c0019176130823bb51fcdd25e9ad977173e68f2b1a2f4d7406bc2a56a86
389-ds-base-devel-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: ab9e66791e5f940119d787eeb78f5866
SHA-256: bfd68d20ae18952e98d2c5942f1f21298b9bc2b1593b1f2d1ea45b56fe4bce67
389-ds-base-devel-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 25604f67bd3dc7ef7c75e8ed588e3516
SHA-256: e10a8a45c502d83dc1354ff0501c708932d964e8d19e601bdc3178f9caa3caf1
389-ds-base-libs-1.2.9.14-1.el6_2.2.i686.rpm
File outdated by:  RHSA-2014:0292
    MD5: 73e6f489d5422eb656a647681dc4cadf
SHA-256: 5476776f692e5b508c26efe0036d461c34d69d0eefa407bf975ecc97ab49109a
389-ds-base-libs-1.2.9.14-1.el6_2.2.x86_64.rpm
File outdated by:  RHSA-2014:0292
    MD5: 84fe2303c5b9713de3a7fa2ca9b432a9
SHA-256: 11be2aac7c1fedcc5a52eeb16f65e13344bade95705fb4608f2254ca3bfb5135
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/