Show Table of Contents
1.105.2. RHBA-2011:0514: nss_ldap bug fix update
An updated nss_ldap package that fixes a bug is now available for Red Hat Enterprise Linux 5.
[Updated 20 May 2011] This advisory has been updated with the correct product name (that is, Red Hat Enterprise Linux 5) in the Details section. The package included in this revised update has not been changed in any way from the package included in the original advisory.
The nss_ldap package contains nss_ldap, a module which allows applications to retrieve information about users, groups, netgroups, from directory servers, and pam_ldap, which allows PAM-aware applications to check users passwords with the aid of a directory server.
This updated nss_ldap package fixes the following bug:
* Previously, if the server closed the connection, the client did not receive any results and failed with the following error, which was caused by the client attempting to parse results which it had not received:
ldap_result: Assertion `ld != ((void *)0)' failed.
With this update, the nss_ldap checks if the server is available while running and finishes with an appropriate error code if the connection fails. (BZ#703831)
All users of nss_ldap are advised to upgrade to this updated package, which resolves this bug.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.