Updated 389-ds-base packages that fix several bugs are now available for Red HatEnterprise Linux 6.
The 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server.

Thebase packages include the Lightweight Directory Access Protocol (LDAP) serverand command-line utilities for server administration.This update fixes the following bugs:* Prior to this update, fixing a deadlock in the asynchronous simple pagedresults requests caused another self deadlock due to a regression.

To addressthis problem, a simple PR_Lock on a connection object has been replaced with are-entrant PR_Monitor.

As a result, the self deadlock no longer occurs.(BZ#1298095)* When a replace operation for a nonexisting attribute was performed withoutproviding new values, the entry was stored with incorrect metadata: an emptydeleted value without an attribute deletion change state number (CSN).

Thisentry could then result in memory corruption and cause the server to terminateunexpectedly.

To fix this bug, additional space to store metadata is nowallocated and the server no longer crashes in this scenario. (BZ#1306572)* Previously, a keep alive entry was being created at too many opportunitiesduring replication, potentially causing a race condition when adding the entryto the replica changelog and resulting in operations being dropped from thereplication. With this update, unnecessary keep alive entry creation has beeneliminated, and missing replication no longer occurs. (BZ#1309962)* When a callback at BE_TXN in the backend add function failed on a cachedentry, the function was attempting to free the entry twice instead of removingit from the cache and then freeing it.

This update adds remove and free code tothe backend add function and the function no longer attempts to free cachedentries twice. (BZ#1314241)* Keep alive entries are used to prevent skipped updates from being evaluatedseveral times in a fractional replication.
If a large number of updates isskipped, these entries can be updated very frequently.

Before the keep aliveentries are updated, it is tested that they exist. Previously, the test wasbeing logged at a “Fatal” log level, so it was always logged no matter which loglevel had been set.

As a consequence, error logs were filled with unnecessarymessages. With this update, the log level for keep alive entry creation has beenchanged from “Fatal” to “Replication debugging” (8192), and the error log fileis no longer filled with “Fatal” messages. (BZ#1314729)Users of 389-ds-base are advised to upgrade to these updated packages, which fixthese bugs.

After installing this update, the 389 server service will berestarted automatically.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
389-ds-base-1.2.11.15-72.el6_7.src.rpm
    MD5: a84fe357aa4e20385aebe4875e01144aSHA-256: b7d7e0b2d338cd0f3088d6b756107e90fc04b13c1c0f2ed4feb99125058630dd
 
IA-32:
389-ds-base-1.2.11.15-72.el6_7.i686.rpm
    MD5: b7a776d3ac1364b8ed7dc0f4a51b93e3SHA-256: 8b00bb22a360d353b7481e91523df2de865c3594fc7b500a594ad45b43b3fa86
389-ds-base-debuginfo-1.2.11.15-72.el6_7.i686.rpm
    MD5: 188183b55199984f0d991367e86d64e3SHA-256: 27c1fee69b4a5f88dd98f8f5d275c5741b0e5f45cc2af8064859652f4f9915ce
389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm
    MD5: 0cd3e69a087e5b6914ae508b5784fd4eSHA-256: 102aa9e766ab52ada6f40fad018feb13f09e3ca37d2db226acd95b2689fd0d15
389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm
    MD5: 6c6543d42c7555e161d29c04796701e7SHA-256: a4e75c066c2c115d05f08365ae9f9c21c889da176b3f73f58bcceda2c1268fca
 
x86_64:
389-ds-base-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 264be0a9b3e0c6fc04908d3d62544a0eSHA-256: 3cf7e3035b75eedaf97d32985065e09163ca3af64f72d0f5955d2fe486e8c1f8
389-ds-base-debuginfo-1.2.11.15-72.el6_7.i686.rpm
    MD5: 188183b55199984f0d991367e86d64e3SHA-256: 27c1fee69b4a5f88dd98f8f5d275c5741b0e5f45cc2af8064859652f4f9915ce
389-ds-base-debuginfo-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 1c0e5eb01c559d9e6386233503ee6672SHA-256: 486bc07dac5e7151a6d0d976011aba13d35a06e1f2068e1a06dcb5ba9c9ffc94
389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm
    MD5: 0cd3e69a087e5b6914ae508b5784fd4eSHA-256: 102aa9e766ab52ada6f40fad018feb13f09e3ca37d2db226acd95b2689fd0d15
389-ds-base-devel-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 8aa1b5147a60f491fca7392cf2ef90caSHA-256: f861f917b3698e868dc7ae0fdeb44938aa1cff029ad624cd81af78cf09ea1372
389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm
    MD5: 6c6543d42c7555e161d29c04796701e7SHA-256: a4e75c066c2c115d05f08365ae9f9c21c889da176b3f73f58bcceda2c1268fca
389-ds-base-libs-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 6ba7fd2e9fdd90ac1ba5471ac3144e17SHA-256: 61b11b7ceef45fe8ab049d127a0b19b37e677976d6ce46086f3461217988b8e8
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
389-ds-base-1.2.11.15-72.el6_7.src.rpm
    MD5: a84fe357aa4e20385aebe4875e01144aSHA-256: b7d7e0b2d338cd0f3088d6b756107e90fc04b13c1c0f2ed4feb99125058630dd
 
x86_64:
389-ds-base-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 264be0a9b3e0c6fc04908d3d62544a0eSHA-256: 3cf7e3035b75eedaf97d32985065e09163ca3af64f72d0f5955d2fe486e8c1f8
389-ds-base-debuginfo-1.2.11.15-72.el6_7.i686.rpm
    MD5: 188183b55199984f0d991367e86d64e3SHA-256: 27c1fee69b4a5f88dd98f8f5d275c5741b0e5f45cc2af8064859652f4f9915ce
389-ds-base-debuginfo-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 1c0e5eb01c559d9e6386233503ee6672SHA-256: 486bc07dac5e7151a6d0d976011aba13d35a06e1f2068e1a06dcb5ba9c9ffc94
389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm
    MD5: 0cd3e69a087e5b6914ae508b5784fd4eSHA-256: 102aa9e766ab52ada6f40fad018feb13f09e3ca37d2db226acd95b2689fd0d15
389-ds-base-devel-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 8aa1b5147a60f491fca7392cf2ef90caSHA-256: f861f917b3698e868dc7ae0fdeb44938aa1cff029ad624cd81af78cf09ea1372
389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm
    MD5: 6c6543d42c7555e161d29c04796701e7SHA-256: a4e75c066c2c115d05f08365ae9f9c21c889da176b3f73f58bcceda2c1268fca
389-ds-base-libs-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 6ba7fd2e9fdd90ac1ba5471ac3144e17SHA-256: 61b11b7ceef45fe8ab049d127a0b19b37e677976d6ce46086f3461217988b8e8
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
389-ds-base-1.2.11.15-72.el6_7.src.rpm
    MD5: a84fe357aa4e20385aebe4875e01144aSHA-256: b7d7e0b2d338cd0f3088d6b756107e90fc04b13c1c0f2ed4feb99125058630dd
 
IA-32:
389-ds-base-1.2.11.15-72.el6_7.i686.rpm
    MD5: b7a776d3ac1364b8ed7dc0f4a51b93e3SHA-256: 8b00bb22a360d353b7481e91523df2de865c3594fc7b500a594ad45b43b3fa86
389-ds-base-debuginfo-1.2.11.15-72.el6_7.i686.rpm
    MD5: 188183b55199984f0d991367e86d64e3SHA-256: 27c1fee69b4a5f88dd98f8f5d275c5741b0e5f45cc2af8064859652f4f9915ce
389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm
    MD5: 0cd3e69a087e5b6914ae508b5784fd4eSHA-256: 102aa9e766ab52ada6f40fad018feb13f09e3ca37d2db226acd95b2689fd0d15
389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm
    MD5: 6c6543d42c7555e161d29c04796701e7SHA-256: a4e75c066c2c115d05f08365ae9f9c21c889da176b3f73f58bcceda2c1268fca
 
x86_64:
389-ds-base-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 264be0a9b3e0c6fc04908d3d62544a0eSHA-256: 3cf7e3035b75eedaf97d32985065e09163ca3af64f72d0f5955d2fe486e8c1f8
389-ds-base-debuginfo-1.2.11.15-72.el6_7.i686.rpm
    MD5: 188183b55199984f0d991367e86d64e3SHA-256: 27c1fee69b4a5f88dd98f8f5d275c5741b0e5f45cc2af8064859652f4f9915ce
389-ds-base-debuginfo-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 1c0e5eb01c559d9e6386233503ee6672SHA-256: 486bc07dac5e7151a6d0d976011aba13d35a06e1f2068e1a06dcb5ba9c9ffc94
389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm
    MD5: 0cd3e69a087e5b6914ae508b5784fd4eSHA-256: 102aa9e766ab52ada6f40fad018feb13f09e3ca37d2db226acd95b2689fd0d15
389-ds-base-devel-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 8aa1b5147a60f491fca7392cf2ef90caSHA-256: f861f917b3698e868dc7ae0fdeb44938aa1cff029ad624cd81af78cf09ea1372
389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm
    MD5: 6c6543d42c7555e161d29c04796701e7SHA-256: a4e75c066c2c115d05f08365ae9f9c21c889da176b3f73f58bcceda2c1268fca
389-ds-base-libs-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 6ba7fd2e9fdd90ac1ba5471ac3144e17SHA-256: 61b11b7ceef45fe8ab049d127a0b19b37e677976d6ce46086f3461217988b8e8
 
Red Hat Enterprise Linux Server EUS (v. 6.7.z)

SRPMS:
389-ds-base-1.2.11.15-72.el6_7.src.rpm
    MD5: a84fe357aa4e20385aebe4875e01144aSHA-256: b7d7e0b2d338cd0f3088d6b756107e90fc04b13c1c0f2ed4feb99125058630dd
 
IA-32:
389-ds-base-1.2.11.15-72.el6_7.i686.rpm
    MD5: b7a776d3ac1364b8ed7dc0f4a51b93e3SHA-256: 8b00bb22a360d353b7481e91523df2de865c3594fc7b500a594ad45b43b3fa86
389-ds-base-debuginfo-1.2.11.15-72.el6_7.i686.rpm
    MD5: 188183b55199984f0d991367e86d64e3SHA-256: 27c1fee69b4a5f88dd98f8f5d275c5741b0e5f45cc2af8064859652f4f9915ce
389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm
    MD5: 0cd3e69a087e5b6914ae508b5784fd4eSHA-256: 102aa9e766ab52ada6f40fad018feb13f09e3ca37d2db226acd95b2689fd0d15
389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm
    MD5: 6c6543d42c7555e161d29c04796701e7SHA-256: a4e75c066c2c115d05f08365ae9f9c21c889da176b3f73f58bcceda2c1268fca
 
x86_64:
389-ds-base-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 264be0a9b3e0c6fc04908d3d62544a0eSHA-256: 3cf7e3035b75eedaf97d32985065e09163ca3af64f72d0f5955d2fe486e8c1f8
389-ds-base-debuginfo-1.2.11.15-72.el6_7.i686.rpm
    MD5: 188183b55199984f0d991367e86d64e3SHA-256: 27c1fee69b4a5f88dd98f8f5d275c5741b0e5f45cc2af8064859652f4f9915ce
389-ds-base-debuginfo-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 1c0e5eb01c559d9e6386233503ee6672SHA-256: 486bc07dac5e7151a6d0d976011aba13d35a06e1f2068e1a06dcb5ba9c9ffc94
389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm
    MD5: 0cd3e69a087e5b6914ae508b5784fd4eSHA-256: 102aa9e766ab52ada6f40fad018feb13f09e3ca37d2db226acd95b2689fd0d15
389-ds-base-devel-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 8aa1b5147a60f491fca7392cf2ef90caSHA-256: f861f917b3698e868dc7ae0fdeb44938aa1cff029ad624cd81af78cf09ea1372
389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm
    MD5: 6c6543d42c7555e161d29c04796701e7SHA-256: a4e75c066c2c115d05f08365ae9f9c21c889da176b3f73f58bcceda2c1268fca
389-ds-base-libs-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 6ba7fd2e9fdd90ac1ba5471ac3144e17SHA-256: 61b11b7ceef45fe8ab049d127a0b19b37e677976d6ce46086f3461217988b8e8
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
389-ds-base-1.2.11.15-72.el6_7.src.rpm
    MD5: a84fe357aa4e20385aebe4875e01144aSHA-256: b7d7e0b2d338cd0f3088d6b756107e90fc04b13c1c0f2ed4feb99125058630dd
 
IA-32:
389-ds-base-1.2.11.15-72.el6_7.i686.rpm
    MD5: b7a776d3ac1364b8ed7dc0f4a51b93e3SHA-256: 8b00bb22a360d353b7481e91523df2de865c3594fc7b500a594ad45b43b3fa86
389-ds-base-debuginfo-1.2.11.15-72.el6_7.i686.rpm
    MD5: 188183b55199984f0d991367e86d64e3SHA-256: 27c1fee69b4a5f88dd98f8f5d275c5741b0e5f45cc2af8064859652f4f9915ce
389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm
    MD5: 0cd3e69a087e5b6914ae508b5784fd4eSHA-256: 102aa9e766ab52ada6f40fad018feb13f09e3ca37d2db226acd95b2689fd0d15
389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm
    MD5: 6c6543d42c7555e161d29c04796701e7SHA-256: a4e75c066c2c115d05f08365ae9f9c21c889da176b3f73f58bcceda2c1268fca
 
x86_64:
389-ds-base-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 264be0a9b3e0c6fc04908d3d62544a0eSHA-256: 3cf7e3035b75eedaf97d32985065e09163ca3af64f72d0f5955d2fe486e8c1f8
389-ds-base-debuginfo-1.2.11.15-72.el6_7.i686.rpm
    MD5: 188183b55199984f0d991367e86d64e3SHA-256: 27c1fee69b4a5f88dd98f8f5d275c5741b0e5f45cc2af8064859652f4f9915ce
389-ds-base-debuginfo-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 1c0e5eb01c559d9e6386233503ee6672SHA-256: 486bc07dac5e7151a6d0d976011aba13d35a06e1f2068e1a06dcb5ba9c9ffc94
389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm
    MD5: 0cd3e69a087e5b6914ae508b5784fd4eSHA-256: 102aa9e766ab52ada6f40fad018feb13f09e3ca37d2db226acd95b2689fd0d15
389-ds-base-devel-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 8aa1b5147a60f491fca7392cf2ef90caSHA-256: f861f917b3698e868dc7ae0fdeb44938aa1cff029ad624cd81af78cf09ea1372
389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm
    MD5: 6c6543d42c7555e161d29c04796701e7SHA-256: a4e75c066c2c115d05f08365ae9f9c21c889da176b3f73f58bcceda2c1268fca
389-ds-base-libs-1.2.11.15-72.el6_7.x86_64.rpm
    MD5: 6ba7fd2e9fdd90ac1ba5471ac3144e17SHA-256: 61b11b7ceef45fe8ab049d127a0b19b37e677976d6ce46086f3461217988b8e8
 
(The unlinked packages above are only available from the Red Hat Network)

1298095 – 1.2.11.15-68.el6_7 ns-slapd crash in ipa context – c_mutex lock memory corruption and self locks1309962 – keep alive entries can break replication1314241 – Double free while adding entries1314729 – change severity of some messages related to “keep alive” entries

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: