Back to bug 1871397
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Red Hat Bugzilla | 2020-08-23 02:55:16 UTC | Pool ID | sst_platform_tools_rhel_8 | |
| Carlos O'Donell | 2020-08-25 13:33:05 UTC | CC | dgallowa | |
| Carlos O'Donell | 2020-08-25 20:10:17 UTC | Assignee | glibc-bugzilla | dj |
| Carlos O'Donell | 2020-09-08 20:40:45 UTC | Blocks | 1877115 | |
| Carlos O'Donell | 2020-09-10 04:48:40 UTC | Doc Type | If docs needed, set a value | Bug Fix |
| Carlos O'Donell | 2020-09-10 04:58:47 UTC | Status | NEW | ASSIGNED |
| Sergey Kolosov | 2020-09-17 07:14:16 UTC | CC | skolosov | |
| Martin Cermak | 2020-10-01 14:55:32 UTC | CC | mcermak | |
| Florian Weimer | 2020-10-05 08:17:24 UTC | CC | sipoyare | |
| DJ Delorie | 2020-10-07 19:04:22 UTC | Doc Text | Cause: Specifically structured /etc/gshadow entries, or changes in file sizes while reading, can cause fgetgsent() to return invalid pointers that cause applications to segfault. Consequence: Applications would become unusable until /etc/gshadow was changed. Fix: The code that reads lines from /etc/gshadow (and other config files, such as /etc/group) has been modified to be more robust. Result: Applications should be able to read /etc/gshadow and other config files without regard to line length, contents, or file activity. |
|
| DJ Delorie | 2020-10-08 04:42:10 UTC | Status | ASSIGNED | MODIFIED |
| Fixed In Version | glibc-2.28-132.el8 | |||
| Red Hat One Jira (issues.redhat.com) | 2020-10-10 02:10:07 UTC | Link ID | Red Hat Issue Tracker - Private RHELPLAN-51915 | |
| Valentina Mukhamedzhanova | 2020-10-14 15:53:17 UTC | CC | vmukhame | |
| Martin Cermak | 2020-10-16 08:20:16 UTC | QA Contact | qe-baseos-tools-bugs | skolosov |
| errata-xmlrpc | 2020-10-21 05:26:31 UTC | Status | MODIFIED | ON_QA |
| Petr Kovar | 2020-11-03 12:33:21 UTC | Docs Contact | zzoubkov | |
| Sergey Kolosov | 2020-11-06 20:13:42 UTC | Status | ON_QA | VERIFIED |
| Zuzana Zoubkova | 2020-11-26 12:08:19 UTC | Flags | needinfo?(dj) | |
| Carlos O'Donell | 2020-11-27 18:03:30 UTC | Keywords | Bugfix | |
| Flags | needinfo?(dj) | |||
| Zuzana Zoubkova | 2020-11-30 09:57:02 UTC | Doc Text | Cause: Specifically structured /etc/gshadow entries, or changes in file sizes while reading, can cause fgetgsent() to return invalid pointers that cause applications to segfault. Consequence: Applications would become unusable until /etc/gshadow was changed. Fix: The code that reads lines from /etc/gshadow (and other config files, such as /etc/group) has been modified to be more robust. Result: Applications should be able to read /etc/gshadow and other config files without regard to line length, contents, or file activity. | .Reading configuration files using `fgetsgent()` and `fgetsgent_r()` is now more robust Prior to this update, specifically structured `/etc/gshadow` entries, or changes in file sizes while reading, could cause the `fgetsgent()` and `fgetsgent_r()` functions to return invalid pointers. Consequently, applications using these functions to read the `/etc/gshadow` file, or other configuration file such as `/etc/group`, failed with a segmentation fault error. This update modifies the `glibc` library functions `fgetsgent()` and `fgetsgent_r()` to make reading configuration files more robust. As a result, applications are now able to read configuration files without regard to line length, contents, or file activity. |
| Zuzana Zoubkova | 2021-01-14 16:36:26 UTC | Flags | needinfo?(codonell) | |
| Carlos O'Donell | 2021-01-18 13:27:40 UTC | Flags | needinfo?(codonell) | |
| Zuzana Zoubkova | 2021-01-18 13:46:41 UTC | Doc Text | .Reading configuration files using `fgetsgent()` and `fgetsgent_r()` is now more robust Prior to this update, specifically structured `/etc/gshadow` entries, or changes in file sizes while reading, could cause the `fgetsgent()` and `fgetsgent_r()` functions to return invalid pointers. Consequently, applications using these functions to read the `/etc/gshadow` file, or other configuration file such as `/etc/group`, failed with a segmentation fault error. This update modifies the `glibc` library functions `fgetsgent()` and `fgetsgent_r()` to make reading configuration files more robust. As a result, applications are now able to read configuration files without regard to line length, contents, or file activity. | .Reading configuration files with `fgetsgent()` and `fgetsgent_r()` is now more robust Specifically structured entries in the `/etc/gshadow` file, or changes in file sizes while reading, sometimes caused the `fgetsgent()` and `fgetsgent_r()` functions to return invalid pointers. Consequently, applications that used these functions to read `/etc/gshadow`, or other configuration files in `/etc/`, failed with a segmentation fault error. This update modifies `fgetsgent()` and `fgetsgent_r()` to make reading of configuration files more robust. As a result, applications are now able to read configuration files successfully. |
| ifelmail | 2021-02-02 04:05:34 UTC | CC | ifelmail | |
| Neal Gompa | 2021-02-10 17:27:25 UTC | CC | ngompa13 | |
| Davide Cavalca | 2021-02-10 19:21:45 UTC | CC | dcavalca | |
| Florian Weimer | 2021-02-10 19:38:41 UTC | Link ID | Red Hat Bugzilla 1927040 | |
| Matt Newsome | 2021-03-18 11:14:14 UTC | Keywords | Triaged | |
| Anthony Zone | 2021-03-25 12:45:37 UTC | CC | azone | |
| errata-xmlrpc | 2021-05-18 00:31:06 UTC | Status | VERIFIED | RELEASE_PENDING |
| errata-xmlrpc | 2021-05-18 14:36:39 UTC | Status | RELEASE_PENDING | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2021-05-18 14:36:39 UTC | |||
| Pavel Najman | 2021-09-17 12:24:26 UTC | Pool ID | sst_platform_tools_rhel_8 | sst_pt_pcp_rhel_8 |
| Pavel Najman | 2021-09-17 12:34:06 UTC | Pool ID | sst_pt_pcp_rhel_8 | sst_pt_gcc_glibc_rhel_8 |
| Mark O'Brien | 2023-07-18 14:30:35 UTC | Pool ID | sst_pt_glibc_rhel_8 | sst_pt_libraries_rhel_8 |
Back to bug 1871397