Bugzilla (bugzilla.redhat.com) will be under maintenance for infrastructure upgrades and will not be unavailable on July 31st between 12:30 AM - 05:30 AM UTC. We appreciate your understanding and patience. You can follow status.redhat.com for details.
Bug 1494124 - Segfault in pam_cgroup.so [rhel-6.9.z]
Summary: Segfault in pam_cgroup.so [rhel-6.9.z]
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: libcgroup
Version: 6.9
Hardware: Unspecified
OS: Unspecified
urgent
high
Target Milestone: rc
: ---
Assignee: Nikola Forró
QA Contact: Chao Ye
URL:
Whiteboard:
Depends On: 1419519
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-09-21 13:53 UTC by Oneata Mircea Teodor
Modified: 2017-10-03 14:28 UTC (History)
14 users (show)

Fixed In Version: libcgroup-0.40.rc1-24.el6_9
Doc Type: Bug Fix
Doc Text:
Previously, if the cgroup pluggable authentication module (PAM) was configured without arguments, the module terminated unexpectedly when opening the session. This update fixes argument processing so that such configuration is handled correctly, which prevents the described crash from occurring.
Clone Of: 1419519
Environment:
Last Closed: 2017-10-03 14:28:10 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2017:2854 0 normal SHIPPED_LIVE libcgroup bug fix update 2017-10-03 18:26:26 UTC

Description Oneata Mircea Teodor 2017-09-21 13:53:01 UTC
This bug has been copied from bug #1419519 and has been proposed to be backported to 6.9 z-stream (EUS).

Comment 7 errata-xmlrpc 2017-10-03 14:28:10 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2017:2854


Note You need to log in before you can comment on or make changes to this bug.