Your message dated Tue, 12 Apr 2005 15:48:25 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#269758: fixed in openldap2 2.1.30-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 3 Sep 2004 11:10:58 +0000
>From [EMAIL PROTECTED] Fri Sep 03 04:10:58 2004
Return-path: <[EMAIL PROTECTED]>
Received: from honk1.physik.uni-konstanz.de [134.34.140.224] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1C3By6-0006eH-00; Fri, 03 Sep 2004 04:10:58 -0700
Received: from localhost (localhost.localnet [127.0.0.1])
        by honk1.physik.uni-konstanz.de (Postfix) with ESMTP id 3462B2BC3F
        for <[EMAIL PROTECTED]>; Fri,  3 Sep 2004 13:10:57 +0200 (CEST)
Received: from honk1.physik.uni-konstanz.de ([127.0.0.1])
        by localhost (honk [127.0.0.1]) (amavisd-new, port 10024) with ESMTP
        id 08865-36 for <[EMAIL PROTECTED]>;
        Fri, 3 Sep 2004 13:10:42 +0200 (CEST)
Received: from bogon.sigxcpu.org (unknown [62.157.100.134])
        (using TLSv1 with cipher EDH-RSA-DES-CBC3-SHA (168/168 bits))
        (No client certificate requested)
        by honk1.physik.uni-konstanz.de (Postfix) with ESMTP id DD1412BC4E
        for <[EMAIL PROTECTED]>; Fri,  3 Sep 2004 13:10:41 +0200 (CEST)
Received: by bogon.sigxcpu.org (Postfix, from userid 1000)
        id 96F684CD1; Fri,  3 Sep 2004 12:57:11 +0200 (CEST)
Date: Fri, 3 Sep 2004 12:57:11 +0200
From: Guido Guenther <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: libldap2: noexistant TLS_CACERTDIR breaks libpam-ldap, slapd and 
ldap-utils
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Reportbug-Version: 2.64
User-Agent: Mutt/1.5.6i
X-Virus-Scanned: by amavisd-new-20030616-p7 (Debian) at 
honk.physik.uni-konstanz.de
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: libldap2
Version: 2.1.30-3
Severity: important
Tags: patch

Hi,
a nonexistant TLS_CACERTDIR in /etc/ldap/ldap.conf lets:

ldapsearch -x -ZZ segfault
slapd segfault
and most important:
breaks logins (not only for ldap users) completely since pam
authentication over ldap segfault due to this bug. This might be RC but
I leave the decision to the maintainer.

simple fix is:


--- ../tls.c.orig       2004-09-03 11:15:54.000000000 +0200
+++ libraries/libldap/tls.c     2004-09-03 11:15:46.645602576 +0200
@@ -480,6 +480,8 @@
                struct stat st;
                
                d = opendir( dir );
+               if ( d == NULL )
+                   return NULL;
                while ( (de=readdir(d)) != NULL ) {
                        snprintf( ca_file, BUFSIZ, "%s/%s", dir, de->d_name );
                

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: powerpc (ppc)
Kernel: Linux 2.6.9-rc1-albook12
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8

Versions of packages libldap2 depends on:
hi  libc6                       2.3.2.ds1-16 GNU C Library: Shared libraries an
ii  libgnutls11                 1.0.16-7     GNU TLS library - runtime library
ii  libsasl2                    2.1.19-1.1   Authentication abstraction library

-- no debconf information

---------------------------------------
Received: (at 269758-close) by bugs.debian.org; 12 Apr 2005 20:03:38 +0000
>From [EMAIL PROTECTED] Tue Apr 12 13:03:38 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DLRbm-00021N-00; Tue, 12 Apr 2005 13:03:38 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DLRN3-00047S-00; Tue, 12 Apr 2005 15:48:25 -0400
From: Torsten Landschoff <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#269758: fixed in openldap2 2.1.30-6
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 12 Apr 2005 15:48:25 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 6

Source: openldap2
Source-Version: 2.1.30-6

We believe that the bug you reported is fixed in the latest version of
openldap2, which is due to be installed in the Debian FTP archive:

libldap2-dev_2.1.30-6_i386.deb
  to pool/main/o/openldap2/libldap2-dev_2.1.30-6_i386.deb
libldap2_2.1.30-6_i386.deb
  to pool/main/o/openldap2/libldap2_2.1.30-6_i386.deb
libslapd2-dev_2.1.30-6_all.deb
  to pool/main/o/openldap2/libslapd2-dev_2.1.30-6_all.deb
openldap2_2.1.30-6.diff.gz
  to pool/main/o/openldap2/openldap2_2.1.30-6.diff.gz
openldap2_2.1.30-6.dsc
  to pool/main/o/openldap2/openldap2_2.1.30-6.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Torsten Landschoff <[EMAIL PROTECTED]> (supplier of updated openldap2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 12 Apr 2005 21:16:44 +0200
Source: openldap2
Binary: libslapd2-dev libldap2 libldap2-dev
Architecture: source all i386
Version: 2.1.30-6
Distribution: unstable
Urgency: low
Maintainer: Torsten Landschoff <[EMAIL PROTECTED]>
Changed-By: Torsten Landschoff <[EMAIL PROTECTED]>
Description: 
 libldap2   - OpenLDAP libraries
 libldap2-dev - OpenLDAP development libraries
 libslapd2-dev - OpenLDAP slapd back-end development headers
Closes: 238444 264443 264448 266688 266688 269758 276380 278875 283606 298270 
304367
Changes: 
 openldap2 (2.1.30-6) unstable; urgency=low
 .
   * Update configure stuff using libtoolize, aclocal-1.4 and autoconf2.50
     to update libtool for kfreebsd-gnu and friends (closes: #266688).
   * Readd ntlm.c from the NTLM patch which got lost somewhere inbetween,
     ouch. Forgot to svn add it...
   * debian/move_files: Move the ucdata files into the slapd package (which
     is no longer build) as libldap2 (where they used to be) does not use
     them (closes: #298270).
   * Apply patch from #278875 to allow building against OpenSSL if
     requested by user (closes: #278875). Run autoconf to recreate configure.
   * debian/check_config: Make check more robust for different autoconf
     versions.
   * debian/rules: Remove automatic invocation of autoheader and autoconf
     as they failed here.
   * debian/slapd.init: Add --oknodo to start-stop-daemon invocations to
     make the script idempotent (bug #298741), patch by Bill Allombert.
   * Retarget and upload to unstable to have slapd and ldap-utils provided
     only by openldap2.2 sources (closes: #304367).
 .
 openldap2 (2.1.30-5) experimental; urgency=low
 .
   * BEWARE: Don't upload this before openldap2.2 is there!!
   * debian/rules: Only build libldap2 and libldap2-dev for client
     packages. The openldap2 source package will be superseded with
     openldap2.2 which provides the server support.
 .
 openldap2 (2.1.30-4) unstable; urgency=low
 .
   * Roland Bauerschmidt <[EMAIL PROTECTED]>
     + Applied patch by Modestas Vainius <[EMAIL PROTECTED]> to fix a
       memory leak in the GNUTLS compatibility wrapper. Closes: #264443.
     + Applied patch by Modestas Vainius <[EMAIL PROTECTED]> to
       install executables without stripping them by using the "-s"
       option. They will be stripped by dh_strip later, which is aware
       of DEB_BUILD_OPTIONS. Closes: #264448.
     + Fix a segmentation fault when a non-existent TLS_CACERTDIR is
       specified in ldap.conf. Thanks to Guido Guenther <[EMAIL PROTECTED]>
       for the straight-forward patch. Closes: #269758.
   * Torsten Landschoff <[EMAIL PROTECTED]>
     + debian/configure.options: Build back-ldap statically (closes: #238444).
     + libraries/libldap/Makefile.in: Link with thread libraries
       (closes: #266688).
     + Refine the patch for the TLS_CACERTDIR problem to log an error
       message if the directory can't be opened.
     + Fix the check if an existing database should be moved (closes: #276380).
     + debian/fix_ldif: Apply patch from Andreas Schuldei for better
       schema checks et cetera.
     + Apply patch for NTLM support from
       http://patches.ximian.com/download.cgi?object=openldap-ntlm.patch-4
       (closes: #283606).
Files: 
 d5ad225f0fcb2697d7d84ac31525d290 951 net optional openldap2_2.1.30-6.dsc
 a498882db55981e6e9dab9e89bb51ccd 454549 net optional openldap2_2.1.30-6.diff.gz
 7ccd54daab07a06752bdf5551b4183df 240954 libs important 
libldap2_2.1.30-6_i386.deb
 e67e8a3dee8a3b0fb00d6f1b663d7805 327394 libdevel extra 
libldap2-dev_2.1.30-6_i386.deb
 3f1b25dc42b2065ed62832afcdc19d8d 72844 libdevel extra 
libslapd2-dev_2.1.30-6_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCXCTddQgHtVUb5EcRAlQMAJ9TV+doVMZaOmW9kek1K6FsGUx0gwCfQF2r
FPgd0UTKwfMDfJ7ZHamxWPk=
=WNcY
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to