Bug 1043557
| Summary: | nscd segfaults when running sudo with netgroup caching enabled. | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | hgraham | |
| Component: | glibc | Assignee: | Siddhesh Poyarekar <spoyarek> | |
| Status: | CLOSED ERRATA | QA Contact: | Arjun Shankar <ashankar> | |
| Severity: | high | Docs Contact: | ||
| Priority: | high | |||
| Version: | 6.5 | CC: | aglotov, alanm, ashankar, bhubbard, codonell, cwfox, dkochuka, fweimer, hgraham, jherrman, jkurik, law, mfranc, mnewsome, mschuppe, m.weiser, pablo.iranzo, pfrankli, spoyarek | |
| Target Milestone: | rc | Keywords: | Reopened, ZStream | |
| Target Release: | 6.6 | |||
| Hardware: | x86_64 | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | glibc-2.12-1.133.el6 | Doc Type: | Bug Fix | |
| Doc Text: |
Due to problems with buffer extension and reallocation, the nscd daemon terminated unexpectedly with a segmentation fault when processing long netgroup entries. With this update, the handling of long netgroup entries has been corrected and nscd no longer crashes in the described scenario.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 1138520 (view as bug list) | Environment: | ||
| Last Closed: | 2014-10-14 04:42:37 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 994246, 1023566, 1054846, 1056252, 1087789 | |||
|
Description
hgraham
2013-12-16 16:09:26 UTC
The solution in this case is to upgrade nss nss-tools and nss-sysinit. NSS is used by glibc for hashing functions and there are bugs in nss* that impact glibc and nscd. *** Bug 1087838 has been marked as a duplicate of this bug. *** Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2014-1391.html |