Back to bug 1398413

Who When What Removed Added
Florian Weimer 2016-11-24 18:24:59 UTC Link ID Sourceware 20191
Carlos O'Donell 2017-01-19 14:09:57 UTC Assignee codonell glibc-bugzilla
Carlos O'Donell 2017-07-20 07:05:48 UTC CC codonell
Matt Newsome 2017-07-21 19:52:23 UTC Blocks 1473718
DJ Delorie 2017-08-24 18:53:36 UTC CC dj
Assignee glibc-bugzilla dj
Sergey Kolosov 2017-08-31 07:46:19 UTC CC skolosov
DJ Delorie 2017-10-06 18:19:35 UTC Status NEW MODIFIED
Fixed In Version glibc-2.17-204.el7
errata-xmlrpc 2017-10-09 04:18:59 UTC Status MODIFIED ON_QA
DJ Delorie 2018-01-11 21:48:39 UTC Doc Text All FILE*-based operations are now hardened against malicious attacks that attempt to manipulate function control flow by writing to the underlying FILE* memory. If a manipulation of the FILE* memory is detected the process is terminated.
Doc Type If docs needed, set a value Enhancement
Sergey Kolosov 2018-01-18 10:10:12 UTC Status ON_QA VERIFIED
QA Contact qe-baseos-tools skolosov
Florian Weimer 2018-04-03 12:02:57 UTC Blocks 1372375
errata-xmlrpc 2018-04-10 01:32:51 UTC Status VERIFIED RELEASE_PENDING
errata-xmlrpc 2018-04-10 13:58:28 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2018-04-10 09:58:28 UTC
errata-xmlrpc 2018-04-10 14:00:11 UTC Link ID Red Hat Product Errata RHSA-2018:0805
Florian Weimer 2018-04-12 15:59:07 UTC See Also https://bugzilla.redhat.com/show_bug.cgi?id=1566623
Florian Weimer 2019-07-03 11:20:05 UTC Link ID Red Hat Bugzilla 1595191

Back to bug 1398413