On Mon, Jan 08, 2007 at 10:03:09PM -0800, dean gaudet wrote:
> when the ldap server closes the connection during a response, libnss-ldap
> doesn't really notice at all... it returns an error code to the caller but
> doesn't pay attention to the error code itself.  then nscd (or whatever
> other caller is involved) tries to re-open a new connection and
> libnss-ldap decides that someone has stolen its old socket and proceeds to
> leak the socket.

Seems reasonable; I built a patched libnss-ldap and am running it on one of
our affected machines. We'll see in a day or two.

thanks!
john


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to