diff options
author | Florian Weimer <fweimer@redhat.com> | 2022-09-13 16:11:40 +0200 |
---|---|---|
committer | Florian Weimer <fweimer@redhat.com> | 2022-10-13 15:45:58 +0200 |
commit | 16c7ed6e68c13e5a5efd8ab464ebf9d07b4b0bb3 (patch) | |
tree | 8720aa824722783f702d9d66e42d892a14ef7b52 | |
parent | c95ef423d78d9a2ec0a8e4141c78165434685c6f (diff) | |
download | glibc-16c7ed6e68c13e5a5efd8ab464ebf9d07b4b0bb3.tar glibc-16c7ed6e68c13e5a5efd8ab464ebf9d07b4b0bb3.tar.gz glibc-16c7ed6e68c13e5a5efd8ab464ebf9d07b4b0bb3.tar.bz2 glibc-16c7ed6e68c13e5a5efd8ab464ebf9d07b4b0bb3.zip |
nss: Fix tst-nss-files-hosts-long on single-stack hosts (bug 24816)
getent implicitly passes AI_ADDRCONFIG to getaddrinfo by default.
Use --no-addrconfig to suppress that, so that both IPv4 and IPv6
lookups succeed even if the address family is not supported by the
host.
Reviewed-by: Carlos O'Donell <carlos@redhat.com>
(cherry picked from commit c75d20b5b27b0a60f0678236f51a4d3b0b058c00)
-rw-r--r-- | NEWS | 1 | ||||
-rw-r--r-- | nss/tst-nss-files-hosts-long.c | 9 |
2 files changed, 6 insertions, 4 deletions
@@ -55,6 +55,7 @@ The following bugs are resolved with this release: [19193] nptl: pthread_kill, pthread_cancel should not fail after exit [22542] CVE-2022-23219: Buffer overflow in sunrpc clnt_create for "unix" [23734] la_symbind*() doesn't get called when LD_BIND_NOW is set + [24816] Fix tst-nss-files-hosts-long on single-stack hosts [25812] Libio vtable protection is sometimes only partially enforced [26643] register x8 and quad sized NEON registers are not properly saved when using ld_audit on aarch64 diff --git a/nss/tst-nss-files-hosts-long.c b/nss/tst-nss-files-hosts-long.c index 00f8bea409..42676ba405 100644 --- a/nss/tst-nss-files-hosts-long.c +++ b/nss/tst-nss-files-hosts-long.c @@ -28,14 +28,15 @@ do_test (void) { int ret; - /* Run getent to fetch the IPv4 address for host test4. - This forces /etc/hosts to be parsed. */ - ret = system("getent ahostsv4 test4"); + /* Run getent to fetch the IPv4 address for host test4. This forces + /etc/hosts to be parsed. Use --no-addrconfig to return addresses + even in an IPv6-only environment. */ + ret = system("getent --no-addrconfig ahostsv4 test4"); if (ret != 0) FAIL_EXIT1("ahostsv4 failed"); /* Likewise for IPv6. */ - ret = system("getent ahostsv6 test6"); + ret = system("getent --no-addrconfig ahostsv6 test6"); if (ret != 0) FAIL_EXIT1("ahostsv6 failed"); |