- Issued:
- 2012-01-25
- Updated:
- 2012-01-25
RHBA-2012:0064 - Bug Fix Advisory
Synopsis
redhat-ds-base bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated redhat-ds-base package that fixes two bugs is now available for Red
Hat Directory Server 8.
Description
Red Hat Directory Server is an LDAPv3-compliant directory server. The
redhat-ds-base package includes the LDAP server and command line utilities for
server administration.
This update fixes the following bugs:
- The previous version of Red Hat Directory Server used the NSPR implementation
of reader/writer locks (rwlocks). However, this implementation does not allow
the use of re-entrant locks and consequent to this, an attempt to perform
multiple concurrent searches with large search filters and many DN syntax
attributes may have led to the server deadlock. With this update, the server has
been adapted to use POSIX rwlocks on Linux platforms. As a result, deadlocks no
longer occur in this scenario. (BZ#758978)
- Due to excessive DN normalization, multiple concurrent searches with large
search filters with many DN syntax attributes could cause the server to use an
inordinate amount of CPU. This update introduces a new configuration attribute,
"nsslapd-normalize-nested-dn", which allows users to turn the DN normalization
off, resolving this issue. (BZ#767273)
All users of Red Hat Directory Server 8 are advised to upgrade to this updated
package, which fixes these bugs.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Directory Server 8 x86_64
- Red Hat Directory Server 8 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Directory Server 8
SRPM | |
---|---|
redhat-ds-base-8.2.8-2.el5dsrv.src.rpm | SHA-256: 5f641a23847d11f45fbc1e7962344fe8251465a3358a266e0e9a0840bf013fbc |
x86_64 | |
redhat-ds-base-8.2.8-2.el5dsrv.x86_64.rpm | SHA-256: 02ed6e4270f272ccb35787bf8f68b733f3c8e40b51cfaff712d9a258f223db27 |
redhat-ds-base-devel-8.2.8-2.el5dsrv.x86_64.rpm | SHA-256: 4b63760c3aaefc5690341fb3faa6f4830347a506744b48d100c9fe0c7b24e5c2 |
i386 | |
redhat-ds-base-8.2.8-2.el5dsrv.i386.rpm | SHA-256: a170d634609fc36743b08fe9aa3f63a7d1c543e74b1703ba9df87b3ba0dafaa3 |
redhat-ds-base-devel-8.2.8-2.el5dsrv.i386.rpm | SHA-256: 7ae7ce473980629243d8ac49a323b2fd6cd92df54fed7bc0c8f178b532826ff2 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.