Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 12 Dec 2017 20:43:23 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 224295] net/nss-pam-ldapd - libressl - Stack overflow
Message-ID:  <bug-224295-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D224295

            Bug ID: 224295
           Summary: net/nss-pam-ldapd - libressl - Stack overflow
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: zi@FreeBSD.org
          Reporter: ryanb@honeycomb.net
          Assignee: zi@FreeBSD.org
             Flags: maintainer-feedback?(zi@FreeBSD.org)

Hello,

Compiling this package against libressl instead of openssl causes a stack
overflow in nslcd when an authentication attempt comes in.

>From messages:

Dec  7 16:21:06 <server> nslcd: stack overflow detected; terminated
Dec  7 16:21:06 <server> kernel: <118>Dec  7 16:21:06 <server> nslcd: stack
overflow detected; terminated

The exact same configuration compiled against openssl works just fine.

The nslcd.conf file:

pagesize 1000
referrals off
filter shadow
(&(objectClass=3DposixAccount)(!(objectClass=3Dcomputer))(uidNumber=3D*))
map shadow shadowLastChange  pwdLastSet
uid nslcd
gid nslcd
uri ldap://<ldapserver>:389
base dc=3Ddomain,dc=3Dtld
ssl starttls
tls_cacertdir /usr/local/etc/openldap/certs
binddn cn=3Dbindacct,dc=3Ddomain,dc=3Dtld
bindpw bindpassword

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-224295-13>