Bug 1836867

Summary: glibc: internal_end*ent in nss_compat may clobber errno, hiding ERANGE
Product: Red Hat Enterprise Linux 8 Reporter: Florian Weimer <fweimer>
Component: glibcAssignee: Florian Weimer <fweimer>
Status: CLOSED ERRATA QA Contact: qe-baseos-tools-bugs
Severity: medium Docs Contact: Zuzana Zoubkova <zzoubkov>
Priority: high    
Version: 8.2CC: ashankar, atikhono, codonell, dj, fweimer, mnewsome, pfrankli, sipoyare, skolosov
Target Milestone: betaKeywords: Bugfix, Patch
Target Release: 8.3   
Hardware: All   
OS: All   
Whiteboard:
Fixed In Version: glibc-2.28-126.el8 Doc Type: Bug Fix
Doc Text:
.Password and group lookups no longer fail in `glibc` Previously, the `nss_compat` module of the `glibc` library overwrote the `errno` status with incorrect error codes during processing of password and group entries. Consequently, applications did not resize buffers as expected, causing password and group lookups to fail. This update fixes the problem, and the lookups now complete as expected.
Story Points: ---
Clone Of: 1834816 Environment:
Last Closed: 2020-11-04 01:33:28 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Florian Weimer 2020-05-18 11:36:47 UTC
+++ This bug was initially created as a clone of Bug #1834816 +++

The end*ent functions such as internal_endpwent call into the rest of glibc and other NSS modules, without saving errno around those calls. Since successful function calls can clobber errno, a critical ERANGE error can be masked, and the caller will not retry with a larger buffer, reporting a different error instead.

Comment 6 Sergey Kolosov 2020-09-19 12:48:40 UTC
Verified, the bug has been fixed in glibc-2.28-126.el8

Comment 9 errata-xmlrpc 2020-11-04 01:33:28 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: glibc security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2020:4444

Comment 11 Florian Weimer 2020-11-27 10:20:12 UTC
*** Bug 1871393 has been marked as a duplicate of this bug. ***