[Impact]
* The bug is a segfault on yppasswd rendering users unable to change their
passwords
* justification for the SRU is the continued request by users and the fact
that it is a very minimal change
* the fix ensures that a lib accessing data unconditionally only gets called
if the values are properly initialized
[Test Case]
* install nis
* Config in /etc/default/nis: NISSERVER=master
* Config in /etc/yp.conf: ypserver 127.0.0.1
* Initialize with
$ sudo /usr/lib/yp/ypinit -m
$ restart rpcbind
* Test if your config works
$ ypcat passwd
should show something like
ubuntu:x:1000:1000:Ubuntu:/home/ubuntu:/bin/bash
* Trigger the bug
$ yppasswd -p ubuntu
Changing NIS account information for ubuntu on wily.localdomain.
Please enter root password:
Changing NIS password for ubuntu on wily.localdomain.
Please enter new password:
Segmentation fault (core dumped)
[Regression Potential]
* While it is assumed to not regress, if it does it is affected to break
yppasswd even more (and while more than a segfault is hard to imagine I mean it
might even break for those people that today got around it by some complex and
weird workarounds.)
* The code is only local to the tool yppasswd and it is not part of a lib or
so, so the impact - if any - should stay local
[Other Info]
* I really want to encourage the users reporting it being important to them
testing it once in proposed to have more than just my tests.
* I wanted to nominate to be able to keep tracking Wily as Fix Released and
Trusty as pending but that doesn't seem to work.
It would be great if the Sponsor with the proper permissions could also set the
proper "Affects" status for those two releases
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1204530
Title:
yppasswd results in a segmentation fault when run on clients or server
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nis/+bug/1204530/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs