Processed: bug 969926 is forwarded to https://sourceware.org/bugzilla/show_bug.cgi?id=20338

2020-09-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 969926 https://sourceware.org/bugzilla/show_bug.cgi?id=20338
Bug #969926 [src:glibc] glibc: Parsing of /etc/gshadow can return bad pointers 
causing segfaults in applications
Set Bug forwarded-to-address to 
'https://sourceware.org/bugzilla/show_bug.cgi?id=20338'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
969926: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969926
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#969926: glibc: Parsing of /etc/gshadow can return bad pointers causing segfaults in applications

2020-09-08 Thread Bernd Zeimetz
Source: glibc
Version: 2.28-10
Severity: serious
Tags: security upstream patch
X-Debbugs-Cc: Debian Security Team 

Hi,

we are running into the bug
https://sourceware.org/bugzilla/show_bug.cgi?id=20338
causing systemd-sysusers to segfault.

Patch is available in the linked bug report.

As it was flagged security in the upstream bugtracker, I'm doing the
same here.

A fix in buster would be appreciated.

Thanks a lot,

Bernd


-- 
 Bernd ZeimetzDebian GNU/Linux Developer
 http://bzed.dehttp://www.debian.org
 GPG Fingerprint: ECA1 E3F2 8E11 2432 D485  DD95 EB36 171A 6FF9 435F