#3231 Segfault while checking ldap_user_extra_attrs config options
Closed: Fixed None Opened 5 years ago by sbose.

The values of the ldap_user_extra_attrs configuration options are checked to make sure no internal attributed are overridden. For this all entries in the sdap_attr_map for user entries are checked. If there is no def_name for an attribute in the map and this attribute is used in ldap_user_extra_attrs SSSD fails with a segfault.

To reproduce this with the IPA provider 'ldap_user_extra_attrs = entryUSN:abc' can be used, with the AD provider 'ldap_user_extra_attrs = shadowMin:abc' causes a segfault.

The workaround is to removed the offending option from ldap_user_extra_attrs because the internal attributes cannot be overridden anyway. Nevertheless SSSD should not segfault and print a proper log message that the attribute name is already used.

Fields changed

owner: somebody => sbose
patch: 0 => 1
status: new => assigned

Fields changed

milestone: NEEDS_TRIAGE => SSSD 1.14.3

Fields changed

rhbz: => 0

resolution: => fixed
status: assigned => closed

Metadata Update from @sbose:
- Issue assigned to sbose
- Issue set to the milestone: SSSD 1.14.3

4 years ago

SSSD is moving from Pagure to Github. This means that new issues and pull requests
will be accepted only in SSSD's github repository.

This issue has been cloned to Github and is available here:
- https://github.com/SSSD/sssd/issues/4264

If you want to receive further updates on the issue, please navigate to the github issue
and click on subscribe button.

Thank you for understanding. We apologize for all inconvenience.

Login to comment on this ticket.