[Pkg-openldap-devel] Bug#666515: segfault when changing/renaming RDN (DN=) with an "audio" attribute
Fabien C.
wrmdmq2arrws3zs at jetable.org
Sat Mar 31 11:05:09 UTC 2012
Package: slapd
Version: 2.4.23-7.2
Severity: high
Hello,
slapd segfaults when the RDN of the entry is changed for an attribute like,
"audio" or "jpegImage".
With the Apache Directory Studio client, I double clicked on the "cn=myentry"
entry which is used in the RDN (dn="cn=myentry,dc=mydomain,dc=com"), the "Rename
Entry" popup appears: "Please enter the new RDN of the selected entry" [0]. I
change the entry type from "cn", to "audio" (or "jpegImage"). I get a segfault
from slapd.
The entry I used was objectClass: inetOrgPerson, organizationalPerson and person.
Here is my syslog output :
[...]
log lines not relative to the segfault
[...]
Mar 30 15:19:44 toto slapd[2214]: => access_allowed: read access granted by
write(=wrscxd)
Mar 30 15:19:44 toto slapd[2214]: => acl_mask: access to entry "cn=Foo Bar
Normal,ou=addressBook,dc=XXXXXXXXX,dc=null", attr "uid" requested
Mar 30 15:19:44 toto slapd[2214]: => acl_mask: to value by
"cn=admin,dc=XXXXXXXXX,dc=null", (=0)
Mar 30 15:19:44 toto slapd[2214]: <= check a_dn_pat: cn=admin,dc=XXXXXXXXX,dc=null
Mar 30 15:19:44 toto slapd[2214]: <= acl_mask: [1] applying write(=wrscxd) (stop)
Mar 30 15:19:44 toto slapd[2214]: <= acl_mask: [1] mask: write(=wrscxd)
Mar 30 15:19:44 toto slapd[2214]: => slap_access_allowed: read access granted by
write(=wrscxd)
Mar 30 15:19:44 toto slapd[2214]: => access_allowed: read access granted by
write(=wrscxd)
Mar 30 15:20:00 toto kernel: slapd[2361]: segfault at 70 ip 000000000044c385 sp
00007fa1a0259920 error 4 in slapd[400000+12a000]
This is reproducible.
[0] http://imagepaste.nullnetwork.net/viewimage.php?id=3601
-- System Information:
Debian Release: 6.0.4
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 3.2.4 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages slapd depends on:
ii adduser 3.112+nmu2 add and remove users and groups
ii coreutils 8.5-1 GNU core utilities
ii debconf [debconf-2.0] 1.5.36.1 Debian configuration management sy
ii libc6 2.11.3-3 Embedded GNU C Library: Shared lib
ii libdb4.8 4.8.30-2 Berkeley v4.8 Database Libraries [
ii libgnutls26 2.8.6-1+squeeze2 the GNU TLS library - runtime libr
ii libldap-2.4-2 2.4.23-7.2 OpenLDAP libraries
ii libltdl7 2.2.6b-2 A system independent dlopen wrappe
ii libperl5.10 5.10.1-17squeeze3 shared Perl library
ii libsasl2-2 2.1.23.dfsg1-7 Cyrus SASL - authentication abstra
ii libslp1 1.2.1-7.8 OpenSLP libraries
ii libwrap0 7.6.q-19 Wietse Venema's TCP wrappers libra
ii lsb-base 3.2-23.2squeeze1 Linux Standard Base 3.2 init scrip
ii perl [libmime-base64-p 5.10.1-17squeeze3 Larry Wall's Practical Extraction
ii psmisc 22.11-1 utilities that use the proc file s
ii unixodbc 2.2.14p2-1 ODBC tools libraries
Versions of packages slapd recommends:
ii libsasl2-modules 2.1.23.dfsg1-7 Cyrus SASL - pluggable authenticat
Versions of packages slapd suggests:
ii ldap-utils 2.4.23-7.2 OpenLDAP utilities
-- Configuration Files:
/etc/default/slapd changed:
SLAPD_USER="openldap"
SLAPD_GROUP="openldap"
SLAPD_PIDFILE=
SLAPD_SERVICES="ldap:/// ldapi:///"
SLAPD_SENTINEL_FILE=/etc/ldap/noslapd
SLAPD_OPTIONS=""
-- debconf information:
slapd/password_mismatch:
slapd/tlsciphersuite:
slapd/fix_directory: true
slapd/invalid_config: true
* shared/organization: XXXXXXXXX
slapd/upgrade_slapcat_failure:
slapd/slurpd_obsolete:
slapd/upgrade_slapadd_failure:
* slapd/backend: BDB
* slapd/dump_database: when needed
* slapd/allow_ldap_v2: false
* slapd/no_configuration: false
slapd/migrate_ldbm_to_bdb: false
slapd/move_old_database: true
slapd/suffix_change: false
slapd/slave_databases_require_updateref:
* slapd/dump_database_destdir: /var/backups/slapd-VERSION
slapd/autoconf_modules: true
* slapd/purge_database: false
* slapd/domain: XXXXXXXXX.null
More information about the Pkg-openldap-devel
mailing list