Red Hat Bugzilla – Bug 168867
ns-slapd crashes during SASL/DIGEST-MD5 authentication.
Last modified: 2008-08-11 20:06:32 EDT
Escalated to Bugzilla from IssueTracker
I think this is a duplicate of 166229 which is due to be fixed in the upcoming
DS 7.1 service pack 1. Can you check the description and comments on that bug
to verify that it is indeed a duplicate? Thanks.
Created attachment 119042 [details]
strace of the ns-slapd process, when doing ldapsearch as a non root user.
Created attachment 119043 [details]
strace of the ns-slapd process, when doing ldapsearch as a root user.
It says I am not authorized to view the BUG 166229 ?.
I guess not. If you look at my strace you would know. My ldapsearch query works
with a -x option ( doing simple authentication instead of sasl) and crashes the
slapd only when doing sasl as a non root user.
Moreover, I am using RHEL 3 update 5 and not RHEL 4.
Here is a gdb trace
#0 0x001330f8 in ?? ()
#1 0xbfffd510 in ?? ()
#2 0x00000003 in ?? ()
#3 0x000000fa in ?? ()
#4 0x756b0dd0 in ?? ()
#5 0x0000000d in ?? ()
#6 0xbfffd528 in ?? ()
#7 0x00000000 in ?? ()
Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 252865456 (LWP 26268)]
0x002ce472 in ?? ()
#0 0x002ce472 in ?? ()
#1 0x0f120338 in ?? ()
#2 0x0029b6f4 in ?? ()
#3 0x08d17070 in ?? ()
#4 0x00000000 in ?? ()
Since the libraries are stripped of symbols, I am not seeing what is happening
other than the ns-slapd process getting SIGSEGV.
Right. The server should work fine when you use -x (which disables SASL auth).
The bug is on all platforms, not just RHEL 3 update 5. I'm pretty sure this is
the same as bug 166229. Keep an eye on that bug - QA will be testing the fix soon.
166229 was closed as fixed in DS 7.1 Sp1
Marking this closed and fixed.
*** This bug has been marked as a duplicate of 166229 ***
DS7.2 is not a valid milestone anymore. Anything thats set to DS7.2 should be
set to DS8.0. Will make further changes per bug council on 07/24/2007, after this.
Bug already CLOSED/VERIFIED. setting screened+ flag