pam_ldap with SSL has a memory leak on RHEL5 and RHEL6 GA

Solution Verified - Updated -

Issue

When accessing an ldap server via pam going through openssl, a memory leak occurs that quickly exhausts heap memory.

Environment

  • Red Hat Enterprise Linux Server 5.3, 5.4, 5.5

    • nss_ldap-253-25.el5 (and earlier versions)
  • Red Hat Enterprise Linux Server 6 GA

    • Using legacy nss_ldap functionality instead of sssd

    • pam_ldap-185-5 and nss-pam-ldapd-0.7..5-3

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.