pam_ldap with SSL has a memory leak on RHEL5 and RHEL6 GA

Solution Verified - Updated -

Issue

When accessing an ldap server via pam going through openssl, a memory leak occurs that quickly exhausts heap memory.

Environment

  • Red Hat Enterprise Linux Server 5.3, 5.4, 5.5

    • nss_ldap-253-25.el5 (and earlier versions)
  • Red Hat Enterprise Linux Server 6 GA

    • Using legacy nss_ldap functionality instead of sssd

    • pam_ldap-185-5 and nss-pam-ldapd-0.7..5-3

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content