Processed: bug 969926 is forwarded to https://sourceware.org/bugzilla/show_bug.cgi?id=20338
Processing commands for cont...@bugs.debian.org: > forwarded 969926 https://sourceware.org/bugzilla/show_bug.cgi?id=20338 Bug #969926 [src:glibc] glibc: Parsing of /etc/gshadow can return bad pointers causing segfaults in applications Set Bug forwarded-to-address to 'https://sourceware.org/bugzilla/show_bug.cgi?id=20338'. > thanks Stopping processing here. Please contact me if you need assistance. -- 969926: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969926 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#969926: glibc: Parsing of /etc/gshadow can return bad pointers causing segfaults in applications
Source: glibc Version: 2.28-10 Severity: serious Tags: security upstream patch X-Debbugs-Cc: Debian Security Team Hi, we are running into the bug https://sourceware.org/bugzilla/show_bug.cgi?id=20338 causing systemd-sysusers to segfault. Patch is available in the linked bug report. As it was flagged security in the upstream bugtracker, I'm doing the same here. A fix in buster would be appreciated. Thanks a lot, Bernd -- Bernd ZeimetzDebian GNU/Linux Developer http://bzed.dehttp://www.debian.org GPG Fingerprint: ECA1 E3F2 8E11 2432 D485 DD95 EB36 171A 6FF9 435F