[Bug 1397250] Update Released

Marcello Blancasio marcello.blancasio at gmail.com
Fri Nov 11 17:55:47 UTC 2016


Thank you. libnss-ldap-264-2.2ubuntu4.14.04.2 fixed the issue.

On Thu, Nov 10, 2016 at 7:12 PM, Brian Murray <brian at ubuntu.com> wrote:
> The verification of the Stable Release Update for libnss-ldap has
> completed successfully and the package has now been released to
> -updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
> unsubscribed and will not receive messages about this bug report.  In
> the event that you encounter a regression using the package from
> -updates please report a new bug using ubuntu-bug and tag the bug report
> regression-update so we can easily find any regressions.
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/1397250
>
> Title:
>   SIGPIPE not caught in do_atfork_child()
>
> Status in nss_ldap:
>   Fix Released
> Status in libnss-ldap package in Ubuntu:
>   Fix Released
> Status in libnss-ldap source package in Trusty:
>   Fix Released
> Status in libnss-ldap source package in Xenial:
>   Won't Fix
> Status in libnss-ldap source package in Yakkety:
>   Won't Fix
>
> Bug description:
>   [Impact]
>
>    * If a process using libnss-ldap calls fork() and SIGPIPE was blocked,
>      the atfork() handler in the child process failed to catch the SIGPIPE
>      as it was supposed to do, that is in the call to  do_close_no_unbind().
>      So that, the uncaught SIGPIPE will be eventually delivered when the
>      child unblocks signals. This usually make the child process die
>      unexpectedly.
>
>    * This is only reproducible when ldap is configured for STARTTLS.
>
>    * Upstream fix has been long integrated.
>
>   [Test Case]
>
>    * See https://bugs.launchpad.net/ubuntu/trusty/+source/libnss-
>   ldap/+bug/1397250/comments/19
>
>
>   [Regression Potential]
>
>    * Fix has been upstream since 2010, and limited to path of child
>      forking, and SIGPIPE is blocked. No consequent bugs or regressions
>      in the upstream blamed on this change.
>
>
>   [Other Info]
>
>    * I'm currently limiting my SRU to trusty, as I'm unable to
>      recreate the bug on xenial.  Even so, I have tested the fixed
>      code on xenial to ensure there was no regression with the testcase.
>
>    * Will look at fixing xenial too, IFF someone comes forward able to
>      reproduce the bug/validate the fix.
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/nss-ldap/+bug/1397250/+subscriptions

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to libnss-ldap in Ubuntu.
https://bugs.launchpad.net/bugs/1397250

Title:
  SIGPIPE not caught in do_atfork_child()

Status in nss_ldap:
  Fix Released
Status in libnss-ldap package in Ubuntu:
  Fix Released
Status in libnss-ldap source package in Trusty:
  Fix Released
Status in libnss-ldap source package in Xenial:
  Won't Fix
Status in libnss-ldap source package in Yakkety:
  Won't Fix

Bug description:
  [Impact]

   * If a process using libnss-ldap calls fork() and SIGPIPE was blocked, 
     the atfork() handler in the child process failed to catch the SIGPIPE 
     as it was supposed to do, that is in the call to  do_close_no_unbind().
     So that, the uncaught SIGPIPE will be eventually delivered when the
     child unblocks signals. This usually make the child process die
     unexpectedly.

   * This is only reproducible when ldap is configured for STARTTLS.

   * Upstream fix has been long integrated.

  [Test Case]

   * See https://bugs.launchpad.net/ubuntu/trusty/+source/libnss-
  ldap/+bug/1397250/comments/19

  
  [Regression Potential] 

   * Fix has been upstream since 2010, and limited to path of child
     forking, and SIGPIPE is blocked. No consequent bugs or regressions
     in the upstream blamed on this change.  

  
  [Other Info]
   
   * I'm currently limiting my SRU to trusty, as I'm unable to 
     recreate the bug on xenial.  Even so, I have tested the fixed 
     code on xenial to ensure there was no regression with the testcase.

   * Will look at fixing xenial too, IFF someone comes forward able to
     reproduce the bug/validate the fix.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nss-ldap/+bug/1397250/+subscriptions



More information about the foundations-bugs mailing list