[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: ldappasswd core dumps w/UFC-Crypt on Slack7 (ITS#598)
I manually applied the changes and it worked like a charm.. I must point
out though that the fix on line 194 (ldappasswd.c) which reads:
if (crypted_pw==NULL || crypted_pw[0]='\0')
return NULL;
probably should be (and what I used):
if (crypted_pw==NULL || crypted_pw[0]=='\0')
return NULL;
-> notice that the original fix forces crypted_pw[0] to be a zero, instead
instead of testing for equality ;)
Thanks for the fast response, it really is appreciated!
--------------- Original Message ---------------
On Sat, 17 Jun 2000, Kurt D. Zeilenga wrote:
> Belay that request for a stack trace back...
> I've committed a quick fix the problem to OPENLDAP_REL_ENG_1_2.
> Please test.
>
> >brad@mrunix.net wrote:
> >Full_Name: Bradford L. Barrett
> >Version: 1.2.11
> >OS: Slackware 7 base/2.2.15 kernel
> >URL:
> >Submission from: (NULL) (208.60.255.34)
> >
> >
> >ldappasswd does a core dump (segfault) when attempting to change a password
> >using {CRYPT} on a Slackware 7 system w/UFC-Crypt (1.3) library installed.
> >I had the same problem with imap-4.7c and wound up having to modify the code to
> >check for a NULL return string before doing a strcpy in order to fix it..
> >It appears that the UFC code has changed a bit and requires the salt to
> >be in a unique format for it to work properly... If it's not the right
> >format, the crypt(3) call just returns a NULL so a strcpy or other pointer
> >oriented operation segfaults hard :( Other encryption methods work without
> >a problem (I've verified MD5 works fine). I'll run a trace on the code and
> >see if I can pinpoint the exact location of the problem when I get a free
> >moment or two.
--
Bradford L. Barrett brad@mrunix.net
A free electron in a sea of neutrons DoD#1750 KD4NAW
The only thing Micro$oft has done for society, is make people
believe that computers are inherently unreliable.