HI I have copied the info from Bugzilla.
Product: Fedora https://bugzilla.redhat.com/show_bug.cgi?id=905638 Patsy Franklin <pfran...@redhat.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(pfrankli@redhat.c | |om) | Flags|needinfo?(pfrankli@redhat.c | |om) | --- Comment #27 from Patsy Franklin <pfran...@redhat.com> --- The most immediate solution is for the application to be changed to use a compliant crypt salt value. After further investigation, we found that the application is passing unsupported, nonstandard salt to crypt(). This will result in crypt() returning NULL and setting errno to EINVAL. It does not appear that the application is checking for a NULL return value from crypt. It also appears that the application is using this NULL return value in a subsequent function call resulting in a segmentation fault. Previously glibc would accept unsupported salt values, but newer versions of the library have become stricter. We are currently reviewing the implementation to see if the accepted salt values can be expanded while still meeting our standards compliance requirements. -- Knut J _______________________________________________ Freesurfer mailing list Freesurfer@nmr.mgh.harvard.edu https://mail.nmr.mgh.harvard.edu/mailman/listinfo/freesurfer The information in this e-mail is intended only for the person to whom it is addressed. If you believe this e-mail was sent to you in error and the e-mail contains patient information, please contact the Partners Compliance HelpLine at http://www.partners.org/complianceline . If the e-mail was sent to you in error but does not contain patient information, please contact the sender and properly dispose of the e-mail.