Issue 8459 - security scans causing slapd failure
Summary: security scans causing slapd failure
Status: VERIFIED FIXED
Alias: None
Product: OpenLDAP
Classification: Unclassified
Component: slapd (show other issues)
Version: unspecified
Hardware: All All
: --- normal
Target Milestone: ---
Assignee: OpenLDAP project
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2016-07-05 17:12 UTC by duffy.lasker@sykes.com
Modified: 2017-09-11 16:38 UTC (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this issue.
Description duffy.lasker@sykes.com 2016-07-05 17:12:52 UTC
Full_Name: duffy lasker
Version: slapd version 2.4.40
OS: CentOS 7
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (184.96.44.7)


security scans for kernel segmentation testing causes the slapd service to enter
failed state, whether the test is successful (causes segmentation fault) or
not.

the ldap server is apparently flooded with STARTTLS events until test end or
successful fault caused.

flooded event:
ACCEPT from IP=xxx.xxx.xxx.xxx:yyyyyy (IP=0.0.0.0:389)
slapd[1251]: conn=15765834 op=0 STARTTLS
slapd[1251]: conn=15765834 op=0 RESULT oid= err=0 text=
ACCEPT from IP=xxx.xxx.xxx.xxx:zzzzz (IP=0.0.0.0:6%6)
slapd[1251]: conn=15765834 fd=35 closed (TLS negotiation failure)

result:
kernel: slapd[14239]: segfault at 10 ip 00007f5028f81c65 sp 00007f4ffdffa550
error 4 in libnss3.so[7f5028f3b000+11e000]
systemd: slapd.service: main process exited, code=killed, status=11/SEGV
systemd: Unit slapd.service entered failed state.
systemd: slapd.service failed.

Comment 1 Michael Ströder 2016-07-05 19:32:21 UTC
duffy.lasker@sykes.com wrote:
> Full_Name: duffy lasker
> Version: slapd version 2.4.40
> OS: CentOS 7
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (184.96.44.7)
> 
> 
> security scans for kernel segmentation testing causes the slapd service to enter
> failed state, whether the test is successful (causes segmentation fault) or
> not.
> 
> the ldap server is apparently flooded with STARTTLS events until test end or
> successful fault caused.

Note that the RHEL/CentOS packages of OpenLDAP are heavily patched and linked
against libnss. Hence it's probably better to report this to them. Also there
were some fixes in their packages recently. Did you yum update to latest package
version?

You can also try to reproduce this failure with recent OpenLDAP release built
from source and linked to OpenSSL. That would be more important to the OpenLDAP
community.

Ciao, Michael.

Comment 2 Quanah Gibson-Mount 2017-03-22 16:37:24 UTC
changed notes
moved from Incoming to Software Bugs
Comment 3 Quanah Gibson-Mount 2017-04-14 20:47:31 UTC
moved from Software Bugs to Incoming
Comment 4 OpenLDAP project 2017-09-11 16:38:31 UTC
moznss issue
Comment 5 Quanah Gibson-Mount 2017-09-11 16:38:31 UTC
changed notes
changed state Open to Closed