Back to bug 1398413
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Florian Weimer | 2016-11-24 18:24:59 UTC | Link ID | Sourceware 20191 | |
| Carlos O'Donell | 2017-01-19 14:09:57 UTC | Assignee | codonell | glibc-bugzilla |
| Carlos O'Donell | 2017-07-20 07:05:48 UTC | CC | codonell | |
| Matt Newsome | 2017-07-21 19:52:23 UTC | Blocks | 1473718 | |
| DJ Delorie | 2017-08-24 18:53:36 UTC | CC | dj | |
| Assignee | glibc-bugzilla | dj | ||
| Sergey Kolosov | 2017-08-31 07:46:19 UTC | CC | skolosov | |
| DJ Delorie | 2017-10-06 18:19:35 UTC | Status | NEW | MODIFIED |
| Fixed In Version | glibc-2.17-204.el7 | |||
| errata-xmlrpc | 2017-10-09 04:18:59 UTC | Status | MODIFIED | ON_QA |
| DJ Delorie | 2018-01-11 21:48:39 UTC | Doc Text | All FILE*-based operations are now hardened against malicious attacks that attempt to manipulate function control flow by writing to the underlying FILE* memory. If a manipulation of the FILE* memory is detected the process is terminated. | |
| Doc Type | If docs needed, set a value | Enhancement | ||
| Sergey Kolosov | 2018-01-18 10:10:12 UTC | Status | ON_QA | VERIFIED |
| QA Contact | qe-baseos-tools | skolosov | ||
| Florian Weimer | 2018-04-03 12:02:57 UTC | Blocks | 1372375 | |
| errata-xmlrpc | 2018-04-10 01:32:51 UTC | Status | VERIFIED | RELEASE_PENDING |
| errata-xmlrpc | 2018-04-10 13:58:28 UTC | Status | RELEASE_PENDING | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2018-04-10 09:58:28 UTC | |||
| errata-xmlrpc | 2018-04-10 14:00:11 UTC | Link ID | Red Hat Product Errata RHSA-2018:0805 | |
| Florian Weimer | 2018-04-12 15:59:07 UTC | See Also | https://bugzilla.redhat.com/show_bug.cgi?id=1566623 | |
| Florian Weimer | 2019-07-03 11:20:05 UTC | Link ID | Red Hat Bugzilla 1595191 |
Back to bug 1398413