Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:1527 - Bug Fix Advisory
Issued:
2009-10-27
Updated:
2009-10-27

RHBA-2009:1527 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

nss_ldap bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated nss_ldap package is now available for Red Hat Enterprise Linux 5.

Description

The nss_ldap package includes two LDAP access clients: nss_ldap and
pam_ldap. nss_ldap is a plugin for the standard C library which allows
applications to look up information about users and groups using a
directory server. The pam_ldap module is a Pluggable Authentication Module
(PAM) which provides for authentication, authorization and password
changing against LDAP servers.

This update fixes the following bug in the nss_ldap module:

  • a NULL value was incorrectly assigned to an ldap_parse_result argument if

the bind operation timed out. Consequently, if the nss_ldap module was
configured to encrypt traffic to the directory server using the "ssl
start_tls" option and TLS negotiation took longer than the "bind_timelimit"
value set in /etc/ldap.conf, the client module would crash with an
Assertion error. With this update, the ldap_parse_result argument is not
set to NULL if the bind operation times out and the Assertion error no
longer occurs. (BZ#529376)

Note: The default bind_timelimit is 30 seconds and this bug did not
normally trigger unless the value was set to less than this default.
Further, it was possible to workaround this issue by increasing the
bind_timelimit (for example, to 60 seconds). This only masked the
underlying issue, however.

All nss_ldap users are advised to upgrade to this updated package, which
resolves this issue.

Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 529376 - Random Assertion `r != ((void *)0)' failed.

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
nss_ldap-253-22.el5_4.src.rpm SHA-256: 4c386c4c641f0fa764d29cf76fd6603451c50dad358c717bab9058be1d17b2f6
x86_64
nss_ldap-253-22.el5_4.i386.rpm SHA-256: eadab94a9c2c79dd287d61b04f6d59409af02ddaf73df918a49075fbdf716f0b
nss_ldap-253-22.el5_4.x86_64.rpm SHA-256: 7c1f5d739353501426a88d3fbcb3b877f4252ab6c626652de74245ef549e290b
ia64
nss_ldap-253-22.el5_4.i386.rpm SHA-256: eadab94a9c2c79dd287d61b04f6d59409af02ddaf73df918a49075fbdf716f0b
nss_ldap-253-22.el5_4.ia64.rpm SHA-256: 14bd4d2b9e6499f6579e3965f21944bbe43a018b1e0f4ca3f1d536d7499e5890
i386
nss_ldap-253-22.el5_4.i386.rpm SHA-256: eadab94a9c2c79dd287d61b04f6d59409af02ddaf73df918a49075fbdf716f0b

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
nss_ldap-253-22.el5_4.src.rpm SHA-256: 4c386c4c641f0fa764d29cf76fd6603451c50dad358c717bab9058be1d17b2f6
x86_64
nss_ldap-253-22.el5_4.i386.rpm SHA-256: eadab94a9c2c79dd287d61b04f6d59409af02ddaf73df918a49075fbdf716f0b
nss_ldap-253-22.el5_4.x86_64.rpm SHA-256: 7c1f5d739353501426a88d3fbcb3b877f4252ab6c626652de74245ef549e290b
i386
nss_ldap-253-22.el5_4.i386.rpm SHA-256: eadab94a9c2c79dd287d61b04f6d59409af02ddaf73df918a49075fbdf716f0b

Red Hat Enterprise Linux Desktop 5

SRPM
nss_ldap-253-22.el5_4.src.rpm SHA-256: 4c386c4c641f0fa764d29cf76fd6603451c50dad358c717bab9058be1d17b2f6
x86_64
nss_ldap-253-22.el5_4.i386.rpm SHA-256: eadab94a9c2c79dd287d61b04f6d59409af02ddaf73df918a49075fbdf716f0b
nss_ldap-253-22.el5_4.x86_64.rpm SHA-256: 7c1f5d739353501426a88d3fbcb3b877f4252ab6c626652de74245ef549e290b
i386
nss_ldap-253-22.el5_4.i386.rpm SHA-256: eadab94a9c2c79dd287d61b04f6d59409af02ddaf73df918a49075fbdf716f0b

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
nss_ldap-253-22.el5_4.src.rpm SHA-256: 4c386c4c641f0fa764d29cf76fd6603451c50dad358c717bab9058be1d17b2f6
s390x
nss_ldap-253-22.el5_4.s390.rpm SHA-256: d9a0ec34f6fc44fef9839752a0913e996395623fce23c0f74fb9a11f5fc94290
nss_ldap-253-22.el5_4.s390x.rpm SHA-256: 43bf4978b63c9d8d2ce978e35b4fa18fb06c5de4c4af4fd59d43d1a3a66f52e4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
nss_ldap-253-22.el5_4.src.rpm SHA-256: 4c386c4c641f0fa764d29cf76fd6603451c50dad358c717bab9058be1d17b2f6
ppc
nss_ldap-253-22.el5_4.ppc.rpm SHA-256: ee782ff1c741fe00b08fe8e59c6bb542158bcf230012d6201f3c66a1b6da074b
nss_ldap-253-22.el5_4.ppc64.rpm SHA-256: 05cc33d5157e3312c374329d5bc3a7d700625725d13a3e5e5402d235969609a9

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
nss_ldap-253-22.el5_4.src.rpm SHA-256: 4c386c4c641f0fa764d29cf76fd6603451c50dad358c717bab9058be1d17b2f6
x86_64
nss_ldap-253-22.el5_4.i386.rpm SHA-256: eadab94a9c2c79dd287d61b04f6d59409af02ddaf73df918a49075fbdf716f0b
nss_ldap-253-22.el5_4.x86_64.rpm SHA-256: 7c1f5d739353501426a88d3fbcb3b877f4252ab6c626652de74245ef549e290b
i386
nss_ldap-253-22.el5_4.i386.rpm SHA-256: eadab94a9c2c79dd287d61b04f6d59409af02ddaf73df918a49075fbdf716f0b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility