.
--
Best regards,
Jakob Østergaard Hegelund
Evalesco A/S
--
Username completion crashes with libnss-ldap
https://bugs.launchpad.net/bugs/219527
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap in ubuntu.
--
Ubuntu
.
--
Best regards,
Jakob Østergaard Hegelund
Evalesco A/S
--
Username completion crashes with libnss-ldap
https://bugs.launchpad.net/bugs/219527
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu
updated systems (including some of mine).
Apparently networking is not a priority for ubuntu.
--
Best regards,
Jakob Østergaard Hegelund
Evalesco A/S
--
Username completion crashes with libnss-ldap
https://bugs.launchpad.net/bugs/219527
You received this bug notification because you
wait with that until they
make it the official recommended solution ;)
Thanks for providing feedback - I hope it helps draw a little bit of
attention to this problem.
--
Best regards,
Jakob Østergaard Hegelund
Evalesco A/S
--
libnss-ldapd nslcd crashes regularly
https
configuration file is compatible with libnss-
ldapd? Can I replace that NSS library safety?
The answers are right above your post...
However, I suggest you consider #227675 before switching.
--
Best regards,
Jakob Østergaard Hegelund
Evalesco A/S
--
Username completion crashes
Mixing and matching packages from various sources is no way to
administer any number of servers.
I could try out 0.6.2, but if it works, it won't help me because
1) Ubuntu won't jump from 0.5.0 to 0.6.2 and can't support the version
2) I won't automatically get security patches to my 0.6.2
So,
I assume this is a dupe of #227675
--
Disconnects and segfault against Open Directory
https://bugs.launchpad.net/bugs/228900
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
Follow one of the HOWTOs on setting up LDAP distribution of user
accounts.
In my setup I use kerberos for the authentication whereas most online
articles describe how to shovel the authentication into LDAP too, but
this doesn't seem to matter. You'll see the problems either way.
--
Username
Public bug reported:
Binary package hint: libnss-ldapd
See 219527 for the story of how I ended up doing what I'm doing
I migrated a server from nss-ldap to nss-ldapd, because of a bug in nss-
ldapd which caused bash and tcsh to crash on username auto-completion.
Now, the nslcd daemon which
About the crashes:
I see the following in the dmesg:
[30378.320041] nslcd[4943]: segfault at 2c0008c0 rip 40b94b rsp 43231610 error 4
[118920.022667] nslcd[6481]: segfault at d8000cb0 rip 4042c6 rsp
41c285f0 error 4
There's no description of the crash in /var/log/daemon - only startup
I can confirm that changing to libnss-ldapd seems to solve the problem
here.
One configuration quirk: To control authorization per-host via LDAP, I
had the following in my old libnss-ldap /etc/ldap.conf:
nss_base_passwd
ou=People,dc=evalesco,dc=com?sub?|(host=eagle.rd)(host=\*.rd)(host=\*)
Actually, tcsh shows this problem as well!
$ tcsh
puffin:~ ls ~
...[snipped]...
puffin:~ ls ~
free(5b3608) bad block. (memtop = 6a5000 membot = 5b3000)
...[snipped]...
puffin:~ ls ~
...[snipped]...
It doesn't crash, but the free error is definitely not to be expected...
The way I see this,
Public bug reported:
Binary package hint: bash
On a system with kerberos authentication and LDAP authorization, bash writes
the following when trying to tab-complete '~':
$ ls ~
malloc: unknown:0: assertion botched
free: start and end chunk sizes differ
This does not happen on a non-LDAP
Ok, this is a dupe of 219527
--
Bash malloc assertion
https://bugs.launchpad.net/bugs/223828
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
Thank you for the reply!
I think you misunderstood my intentions. I guess I confused matters by
pointing to the broken fix in 1.4. Let's forget everything about 1.4,
Edgy and Feisty, and start over :)
This is the problem:
Version 1.2a currently shipped with Dapper will segfault on bad mime
Public bug reported:
Binary package hint: spamprobe
In version 1.2a-1 from Ubuntu (and vanilla 1.2a) spamprobe can segfault
on certain Mime input.
The bug is in MimeDecoder.cc, around line 88:
unsigned int index = (unsigned)ch;
if (BASE64_CHARS[index] = 0) {
ch is a signed char. If ch is
16 matches
Mail list logo