Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2011:0097 - Bug Fix Advisory
Issued:
2011-01-13
Updated:
2011-01-13

RHBA-2011:0097 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

nss_ldap bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated nss_ldap package that fixes multiple bugs is now available for Red
Hat Enterprise Linux 5.

Description

The nss_ldap package contains the nss_ldap and pam_ldap modules. The nss_ldap
module is a plug-in which allows applications to retrieve information about
users and groups from a directory server. The pam_ldap module allows a directory
server to be used by PAM-aware applications to verify user passwords.

This update fixes the following bugs:

  • When looking up host names and addresses, the 'gethostbyname_r' function did

not return a proper value for the 'errno_p' parameter when the length of the
name or the address was less than was required. This resulted in the host name
and the address being overlooked and not returned. With this update, the
aforementioned function has been fixed and works as expected. (BZ#468807)

  • Under certain conditions, an application which spawned a new child process

would begin exhibiting undefined behavior. This was caused by the 'free()'
function being called in the 'fork()' function which resulted in a race and hung
the application. This update fixes the race issue and the application no longer
hangs. (BZ#474181)

  • Prior to this update, some processes would trigger SELinux policy denials when

attempting to use a connection to a directory server which its parent process
had opened. This was caused by a leaked file descriptor. With this update, file
descriptors are no longer leaked, thus, SELinux policy denials are no longer
triggered. (BZ#500397)

  • When using pluggable authentication modules (PAM), selected modules can be

loaded and unloaded upon each authentication attempt. However, unloading the
pam_ldap module could cause the memory that is allocated by libraries on which
it depends to be lost. Consequent to this, multiple authentication attempts may
have led to a significant memory loss. To prevent this, the pam_ldap module is
no longer unloaded. (BZ#511238)

  • When authenticating users using a directory server which provides a password

aging policy, a user whose password will expire in less than a day would not be
warned of the impending expiration. With this update, a password expiry warning
is shown that reminds the user of the impending password expiration. (BZ#537358)

  • When the "/etc/ldap.conf" configuration file contained an incomplete

configuration or a setting with too large a value, a process which attempted to
use nss_ldap could crash. With this update, a crash no longer occurs and an
appropriate error is returned. (BZ#538498)

  • Adding a large amount of users (multiple kilobytes of usernames) to the

'nss_initgroups_ignoreusers' option in the "/etc/ldap.conf" configuration file
resulted in an "Assertion failed" error when executing any nss_ldap related
commands. With this update, adding multiple users to the
'nss_initgroups_ignoreusers' option works as expected. (BZ#584157)

  • When an LDAP context has been established, obtaining the list of groups a user

belongs to could result in a memory leak. With this update, a patch has been
applied to address this issue, and such memory leaks no longer occur.
(BZ#654650)

  • Under certain circumstances, the nss_ldap module may have been unable to

correctly process LDAP entries with a large number of group members. This was
due to an error number being accidentally overwritten before the control was
returned to the caller. When this happened, various utilities failed to produce
expected results. With this update, this error has been fixed, the error number
is no longer overwritten, and affected utilities now work properly. (BZ#661630)

All users of nss_ldap are advised to upgrade to this updated package, which
resolves these issues.

Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 468807 - The function _nss_ldap_gethostbyname_r doen't set the proper return value and errno_p when the length of name is less than required
  • BZ - 474181 - race in fork()
  • BZ - 500397 - spamc denials
  • BZ - 537358 - RHEL ldap clients are not showing password expiry warning
  • BZ - 654650 - Memory leak in nss_ldap
  • BZ - 661630 - id returns failure when nss_ldap uses TLS and oneshot nss_connect_policy

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
nss_ldap-253-37.el5.src.rpm SHA-256: f40827dc5f02807d50837599ec66d752a7c85a87e1a66dc61f53bcf772694b71
x86_64
nss_ldap-253-37.el5.i386.rpm SHA-256: 7ac228a4f0bcf0a8ceee4aa994f5bffe20b258a7223fa0abd2255a9ef1db1242
nss_ldap-253-37.el5.x86_64.rpm SHA-256: 8e80097fc8afe935ed3929587d396de666cafafc9c4d3039944b7815bfc39047
ia64
nss_ldap-253-37.el5.i386.rpm SHA-256: 7ac228a4f0bcf0a8ceee4aa994f5bffe20b258a7223fa0abd2255a9ef1db1242
nss_ldap-253-37.el5.ia64.rpm SHA-256: 3de4282b418edb18328f579ac4c55f31ef473cd42cdf0af34ffb5bc7a0aff938
i386
nss_ldap-253-37.el5.i386.rpm SHA-256: 7ac228a4f0bcf0a8ceee4aa994f5bffe20b258a7223fa0abd2255a9ef1db1242

Red Hat Enterprise Linux Workstation 5

SRPM
nss_ldap-253-37.el5.src.rpm SHA-256: f40827dc5f02807d50837599ec66d752a7c85a87e1a66dc61f53bcf772694b71
x86_64
nss_ldap-253-37.el5.i386.rpm SHA-256: 7ac228a4f0bcf0a8ceee4aa994f5bffe20b258a7223fa0abd2255a9ef1db1242
nss_ldap-253-37.el5.x86_64.rpm SHA-256: 8e80097fc8afe935ed3929587d396de666cafafc9c4d3039944b7815bfc39047
i386
nss_ldap-253-37.el5.i386.rpm SHA-256: 7ac228a4f0bcf0a8ceee4aa994f5bffe20b258a7223fa0abd2255a9ef1db1242

Red Hat Enterprise Linux Desktop 5

SRPM
nss_ldap-253-37.el5.src.rpm SHA-256: f40827dc5f02807d50837599ec66d752a7c85a87e1a66dc61f53bcf772694b71
x86_64
nss_ldap-253-37.el5.i386.rpm SHA-256: 7ac228a4f0bcf0a8ceee4aa994f5bffe20b258a7223fa0abd2255a9ef1db1242
nss_ldap-253-37.el5.x86_64.rpm SHA-256: 8e80097fc8afe935ed3929587d396de666cafafc9c4d3039944b7815bfc39047
i386
nss_ldap-253-37.el5.i386.rpm SHA-256: 7ac228a4f0bcf0a8ceee4aa994f5bffe20b258a7223fa0abd2255a9ef1db1242

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
nss_ldap-253-37.el5.src.rpm SHA-256: f40827dc5f02807d50837599ec66d752a7c85a87e1a66dc61f53bcf772694b71
s390x
nss_ldap-253-37.el5.s390.rpm SHA-256: 54188a44dfffc8a0fe150fe050f319478db72bb45d0a8f78a785660a21a52496
nss_ldap-253-37.el5.s390x.rpm SHA-256: 324bfb0a8ea9dc6a41d9fd51b2afc18bd83a1434c3cb2ffea265b39a0c07cd0d

Red Hat Enterprise Linux for Power, big endian 5

SRPM
nss_ldap-253-37.el5.src.rpm SHA-256: f40827dc5f02807d50837599ec66d752a7c85a87e1a66dc61f53bcf772694b71
ppc
nss_ldap-253-37.el5.ppc.rpm SHA-256: e3948bc69c3fe35d38664a921df41d13662dfe0b56e687ffd73de2192f811413
nss_ldap-253-37.el5.ppc64.rpm SHA-256: 37f6ff86fc4f20488ee1487a2ef6acbcaa09bc2f74302b6461d5aa7d8e3c1f38

Red Hat Enterprise Linux Server from RHUI 5

SRPM
nss_ldap-253-37.el5.src.rpm SHA-256: f40827dc5f02807d50837599ec66d752a7c85a87e1a66dc61f53bcf772694b71
x86_64
nss_ldap-253-37.el5.i386.rpm SHA-256: 7ac228a4f0bcf0a8ceee4aa994f5bffe20b258a7223fa0abd2255a9ef1db1242
nss_ldap-253-37.el5.x86_64.rpm SHA-256: 8e80097fc8afe935ed3929587d396de666cafafc9c4d3039944b7815bfc39047
i386
nss_ldap-253-37.el5.i386.rpm SHA-256: 7ac228a4f0bcf0a8ceee4aa994f5bffe20b258a7223fa0abd2255a9ef1db1242

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility