Hello Jean-Baptiste, or anyone else affected, Accepted adsys into noble-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/adsys/0.14.2~24.04 in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, what testing has been performed on the package and change the tag from verification-needed- noble to verification-done-noble. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification- failed-noble. In either case, without details of your testing we will not be able to proceed. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance for helping! N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days. ** Changed in: adsys (Ubuntu Noble) Status: New => Fix Committed ** Tags added: verification-needed verification-needed-noble ** Changed in: adsys (Ubuntu Jammy) Status: New => Fix Committed ** Tags added: verification-needed-jammy -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to adsys in Ubuntu. https://bugs.launchpad.net/bugs/2078247 Title: rewrite from / to @ formats overwrites usernames Status in adsys package in Ubuntu: Fix Released Status in adsys source package in Jammy: Fix Committed Status in adsys source package in Noble: Fix Committed Bug description: tracking bug https://bugs.launchpad.net/ubuntu/+source/adsys/+bug/2078245 [ Impact ] In this code, the string was not zero terminated properly when overwritten resulting in extra characters: static char *slash_to_at_username(const char *username) { char *backslash = strchr(username, '\\'); if (backslash != NULL) { char *ret = malloc((strlen(username) + 1) * sizeof(char)); strcpy(ret, backslash + 1); strcat(ret, "@"); strncpy(ret + strlen(ret), username, backslash - username); return ret; } return strdup(username); For instance: domain.tld\\user was changed to user@domain.tldld So se user cannot login with the domain\user format [ Test Plan ] 1. On a machine joined to an AD domain with ADsys installed, login with domain\user => Without the patch the user cannot log in => With the patch the user can log in [ Where problems could occur ] Worst case the user still cannot log in To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/adsys/+bug/2078247/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp