Back to bug 1871397

Who When What Removed Added
Red Hat Bugzilla 2020-08-23 02:55:16 UTC Pool ID sst_platform_tools_rhel_8
Carlos O'Donell 2020-08-25 13:33:05 UTC CC dgallowa
Carlos O'Donell 2020-08-25 20:10:17 UTC Assignee glibc-bugzilla dj
Carlos O'Donell 2020-09-08 20:40:45 UTC Blocks 1877115
Carlos O'Donell 2020-09-10 04:48:40 UTC Doc Type If docs needed, set a value Bug Fix
Carlos O'Donell 2020-09-10 04:58:47 UTC Status NEW ASSIGNED
Sergey Kolosov 2020-09-17 07:14:16 UTC CC skolosov
Martin Cermak 2020-10-01 14:55:32 UTC CC mcermak
Florian Weimer 2020-10-05 08:17:24 UTC CC sipoyare
DJ Delorie 2020-10-07 19:04:22 UTC Doc Text Cause: Specifically structured /etc/gshadow entries, or changes in file sizes while reading, can cause fgetgsent() to return invalid pointers that cause applications to segfault.

Consequence: Applications would become unusable until /etc/gshadow was changed.

Fix: The code that reads lines from /etc/gshadow (and other config files, such as /etc/group) has been modified to be more robust.

Result: Applications should be able to read /etc/gshadow and other config files without regard to line length, contents, or file activity.
DJ Delorie 2020-10-08 04:42:10 UTC Status ASSIGNED MODIFIED
Fixed In Version glibc-2.28-132.el8
Red Hat One Jira (issues.redhat.com) 2020-10-10 02:10:07 UTC Link ID Red Hat Issue Tracker - Private RHELPLAN-51915
Valentina Mukhamedzhanova 2020-10-14 15:53:17 UTC CC vmukhame
Martin Cermak 2020-10-16 08:20:16 UTC QA Contact qe-baseos-tools-bugs skolosov
errata-xmlrpc 2020-10-21 05:26:31 UTC Status MODIFIED ON_QA
Petr Kovar 2020-11-03 12:33:21 UTC Docs Contact zzoubkov
Sergey Kolosov 2020-11-06 20:13:42 UTC Status ON_QA VERIFIED
Zuzana Zoubkova 2020-11-26 12:08:19 UTC Flags needinfo?(dj)
Carlos O'Donell 2020-11-27 18:03:30 UTC Keywords Bugfix
Flags needinfo?(dj)
Zuzana Zoubkova 2020-11-30 09:57:02 UTC Doc Text Cause: Specifically structured /etc/gshadow entries, or changes in file sizes while reading, can cause fgetgsent() to return invalid pointers that cause applications to segfault.

Consequence: Applications would become unusable until /etc/gshadow was changed.

Fix: The code that reads lines from /etc/gshadow (and other config files, such as /etc/group) has been modified to be more robust.

Result: Applications should be able to read /etc/gshadow and other config files without regard to line length, contents, or file activity.
.Reading configuration files using `fgetsgent()` and `fgetsgent_r()` is now more robust

Prior to this update, specifically structured `/etc/gshadow` entries, or changes in file sizes while reading, could cause the `fgetsgent()` and `fgetsgent_r()` functions to return invalid pointers. Consequently, applications using these functions to read the `/etc/gshadow` file, or other configuration file such as `/etc/group`, failed with a segmentation fault error.

This update modifies the `glibc` library functions `fgetsgent()` and `fgetsgent_r()` to make reading configuration files more robust. As a result, applications are now able to read configuration files without regard to line length, contents, or file activity.
Zuzana Zoubkova 2021-01-14 16:36:26 UTC Flags needinfo?(codonell)
Carlos O'Donell 2021-01-18 13:27:40 UTC Flags needinfo?(codonell)
Zuzana Zoubkova 2021-01-18 13:46:41 UTC Doc Text .Reading configuration files using `fgetsgent()` and `fgetsgent_r()` is now more robust

Prior to this update, specifically structured `/etc/gshadow` entries, or changes in file sizes while reading, could cause the `fgetsgent()` and `fgetsgent_r()` functions to return invalid pointers. Consequently, applications using these functions to read the `/etc/gshadow` file, or other configuration file such as `/etc/group`, failed with a segmentation fault error.

This update modifies the `glibc` library functions `fgetsgent()` and `fgetsgent_r()` to make reading configuration files more robust. As a result, applications are now able to read configuration files without regard to line length, contents, or file activity.
.Reading configuration files with `fgetsgent()` and `fgetsgent_r()` is now more robust

Specifically structured entries in the `/etc/gshadow` file, or changes in file sizes while reading, sometimes caused the `fgetsgent()` and `fgetsgent_r()` functions to return invalid pointers. Consequently, applications that used these functions to read `/etc/gshadow`, or other configuration files in `/etc/`, failed with a segmentation fault error. This update modifies `fgetsgent()` and `fgetsgent_r()` to make reading of configuration files more robust. As a result, applications are now able to read configuration files successfully.
ifelmail 2021-02-02 04:05:34 UTC CC ifelmail
Neal Gompa 2021-02-10 17:27:25 UTC CC ngompa13
Davide Cavalca 2021-02-10 19:21:45 UTC CC dcavalca
Florian Weimer 2021-02-10 19:38:41 UTC Link ID Red Hat Bugzilla 1927040
Matt Newsome 2021-03-18 11:14:14 UTC Keywords Triaged
Anthony Zone 2021-03-25 12:45:37 UTC CC azone
errata-xmlrpc 2021-05-18 00:31:06 UTC Status VERIFIED RELEASE_PENDING
errata-xmlrpc 2021-05-18 14:36:39 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2021-05-18 14:36:39 UTC
Pavel Najman 2021-09-17 12:24:26 UTC Pool ID sst_platform_tools_rhel_8 sst_pt_pcp_rhel_8
Pavel Najman 2021-09-17 12:34:06 UTC Pool ID sst_pt_pcp_rhel_8 sst_pt_gcc_glibc_rhel_8
Mark O'Brien 2023-07-18 14:30:35 UTC Pool ID sst_pt_glibc_rhel_8 sst_pt_libraries_rhel_8

Back to bug 1871397