nss make sure startp initialized do first

(cherry picked from commit 54be000bccdf6b217eb6adb2d61c2e96eaed5524)
This commit is contained in:
chengyechun 2021-11-30 15:16:16 +08:00 committed by openeuler-sync-bot
parent 5404347ab9
commit e36811bb21
2 changed files with 34 additions and 1 deletions

View File

@ -0,0 +1,26 @@
From 9d99c240898d67e7942a9dc0b9967419118a6407 Mon Sep 17 00:00:00 2001
From: chengyechun <chengyechun1@huawei.com>
Date: Sat, 27 Nov 2021 10:04:03 +0800
Subject: [PATCH] backport-nss-make-sure-startp_initialized-do-first
The function atomic_read_barrier is added for preventing coredump when the script frequently invokes
the getpwnam_r function.
---
nss/getXXbyYY_r.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/nss/getXXbyYY_r.c b/nss/getXXbyYY_r.c
index 5ebf36c..21b0d98 100644
--- a/nss/getXXbyYY_r.c
+++ b/nss/getXXbyYY_r.c
@@ -297,6 +297,7 @@ INTERNAL (REENTRANT_NAME) (ADD_PARAMS, LOOKUP_TYPE *resbuf, char *buffer,
}
else
{
+ atomic_read_barrier();
fct.l = start_fct;
nip = startp;
#ifdef PTR_DEMANGLE
--
1.8.3.1

View File

@ -59,7 +59,7 @@
##############################################################################
Name: glibc
Version: 2.28
Release: 79
Release: 80
Summary: The GNU libc libraries
License: %{all_license}
URL: http://www.gnu.org/software/glibc/
@ -138,6 +138,7 @@ Patch54: backport-CVE-2021-38604-0002-librt-fix-null-pointer-deference.patch
Patch55: backport-ldconfig-avoid-leak-on-empty-paths-in-config-file.patch
Patch56: backport-rtld-copy-terminating-null-in-tunables_strdup-bug-28.patch
Patch57: backport-gconv-Do-not-emit-spurious-NUL-character-in-ISO-2022.patch
Patch58: backport-nss-make-sure-startp_initialized-do-first.patch
Provides: ldconfig rtld(GNU_HASH) bundled(gnulib)
@ -1162,6 +1163,12 @@ fi
%doc hesiod/README.hesiod
%changelog
* Tue Nov 30 2021 chengyechun <chengyechun1@huawei.com> -2.28-80
- Type: bugfix
- CVE: NA
- SUG: restart
- DESC: nss make sure startp initialized do first
* Tue Nov 9 2021 Qingqing Li <liqingqing3@huawei.com> - 2.28-79
- gconv: Do not emit spurious NUL character in ISO-2022-JP-3
this is also fix CVE-2021-43396