Debian Package Tracker
Register | Log in
Subscribe

glibc

Choose email to subscribe with

general
  • source: glibc (optional, misc)
  • version: 2.26-2
  • maintainer: GNU Libc Maintainers (archive) [DMD]
  • uploaders: Adam Conrad [DMD] – Aurelien Jarno [DMD] – Clint Adams [DMD] – Samuel Thibault [DMD]
  • arch: all any
  • std-ver: 4.1.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 2.19-18+deb8u10
  • old-sec: 2.19-18+deb8u10
  • stable: 2.24-11+deb9u1
  • stable-sec: 2.24-11+deb9u1
  • stable-p-u: 2.24-11+deb9u2
  • testing: 2.25-5
  • unstable: 2.26-2
  • exp: 2.26.9000+20180105.a6d0afb5-0experimental0
versioned links
  • 2.19-18+deb8u10: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.24-11+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.24-11+deb9u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.25-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.25-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.25-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.26-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.26-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.26.9000+20180105.a6d0afb5-0experimental0: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • glibc-doc
  • glibc-source
  • libc-bin
  • libc-dev-bin
  • libc-l10n
  • libc0.1
  • libc0.1-dbg
  • libc0.1-dev
  • libc0.1-dev-i386
  • libc0.1-i386
  • libc0.1-pic
  • libc0.1-udeb
  • libc0.3
  • libc0.3-dbg
  • libc0.3-dev
  • libc0.3-pic
  • libc0.3-udeb
  • libc0.3-xen
  • libc6
  • libc6-amd64
  • libc6-dbg
  • libc6-dev
  • libc6-dev-amd64
  • libc6-dev-i386
  • libc6-dev-mips32
  • libc6-dev-mips64
  • libc6-dev-mipsn32
  • libc6-dev-powerpc
  • libc6-dev-ppc64
  • libc6-dev-s390
  • libc6-dev-sparc
  • libc6-dev-sparc64
  • libc6-dev-x32
  • libc6-i386
  • libc6-mips32
  • libc6-mips64
  • libc6-mipsn32
  • libc6-pic
  • libc6-powerpc
  • libc6-ppc64
  • libc6-s390
  • libc6-sparc
  • libc6-sparc64
  • libc6-udeb
  • libc6-x32
  • libc6-xen
  • libc6.1
  • libc6.1-alphaev67
  • libc6.1-dbg
  • libc6.1-dev
  • libc6.1-pic
  • libc6.1-udeb
  • locales
  • locales-all
  • multiarch-support
  • nscd
action needed
Multiarch hinter reports 1 issue(s) high
There are issues with the multiarch metadata for this package.
  • libc6 conflicts on /lib/ld.so.1 on mips <-> mipsel
Created: 2017-04-13 Last update: 2018-01-06 08:06
2 security issues in sid high
There are 2 open security issues in sid.
2 important issues:
  • CVE-2017-8804: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779.
  • CVE-2016-10228: The iconv program in the GNU C Library (aka glibc or libc6) 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
Please fix them.
Created: 2017-03-01 Last update: 2018-01-06 01:35
3 security issues in buster high
There are 3 open security issues in buster.
3 important issues:
  • CVE-2017-16997: elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
  • CVE-2017-8804: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779.
  • CVE-2016-10228: The iconv program in the GNU C Library (aka glibc or libc6) 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
Please fix them.
Created: 2017-06-18 Last update: 2018-01-06 01:35
lintian reports 145 warnings high
Lintian reports 145 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2015-03-06 Last update: 2018-01-05 07:35
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2016-04-06 Last update: 2018-01-06 08:03
45 bugs tagged patch in the BTS normal
The BTS contains patches fixing 45 bugs (49 if counting merged bugs), consider including or untagging them.
Created: 2017-11-21 Last update: 2018-01-06 07:39
A new version is available in the VCS, consider uploading it. normal
vcswatch reports that this package has a new version ready in the VCS. You should consider uploading into the archive.

Created: 2018-01-03 Last update: 2018-01-03 19:58
10 ignored security issues in stretch low
There are 10 open security issues in stretch.
10 issues skipped by the security teams:
  • CVE-2017-16997: elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
  • CVE-2017-15670: The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.
  • CVE-2017-12132: The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
  • CVE-2016-10228: The iconv program in the GNU C Library (aka glibc or libc6) 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
  • CVE-2017-15671: The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
  • CVE-2017-15804: The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
  • CVE-2017-1000409:
  • CVE-2017-12133: The DNS stub resolver in the GNU C Library (glibc) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attackers due to IP fragmentation.
  • CVE-2017-8804: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779.
  • CVE-2017-1000408:
Please fix them.
Created: 2017-03-01 Last update: 2018-01-06 01:35
12 ignored security issues in jessie low
There are 12 open security issues in jessie.
12 issues skipped by the security teams:
  • CVE-2015-5180: res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).
  • CVE-2016-10228: The iconv program in the GNU C Library (aka glibc or libc6) 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
  • CVE-2017-16997: elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
  • CVE-2017-1000409:
  • CVE-2017-12133: The DNS stub resolver in the GNU C Library (glibc) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attackers due to IP fragmentation.
  • CVE-2017-8804: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779.
  • CVE-2014-9761: Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
  • CVE-2017-15671: The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
  • CVE-2017-1000408:
  • CVE-2017-12132: The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
  • CVE-2017-15804: The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
  • CVE-2017-15670: The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.
Please fix them.
Created: 2015-07-12 Last update: 2018-01-06 01:35
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2017-10-26 Last update: 2018-01-04 01:46
testing migrations
  • This package is part of the ongoing testing transition known as glibc-2.26. Please avoid uploads unrelated to this transition, they would likely delay it and require supplementary work from the release managers. On the other hand, if your package has problems preventing it to migrate to testing, please fix them as soon as possible. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migration status: BLOCKED: Maybe temporary, maybe blocked but Britney is missing information (check below or the buildds)
    • Too young, only 0 of 5 days old
    • missing build on armhf: libc-bin, libc-dev-bin, libc6, libc6-dbg, libc6-dev, libc6-pic, libc6-udeb, locales-all, multiarch-support, nscd (from 2.26-1)
    • missing build on mips: libc-bin, libc-dev-bin, libc6, libc6-dbg, libc6-dev, libc6-dev-mips64, libc6-dev-mipsn32, libc6-mips64, libc6-mipsn32, libc6-pic, libc6-udeb, locales-all, multiarch-support, nscd (from 2.26-1)
    • missing build on mips64el: libc-bin, libc-dev-bin, libc6, libc6-dbg, libc6-dev, libc6-dev-mips32, libc6-dev-mipsn32, libc6-mips32, libc6-mipsn32, libc6-pic, libc6-udeb, locales-all, multiarch-support, nscd (from 2.26-1)
    • old binaries left on all: glibc-doc, glibc-doc, glibc-doc, glibc-source, glibc-source, glibc-source, libc-l10n, libc-l10n, libc-l10n, locales, locales, locales (from 2.26-1) (but ignoring cruft, so nevermind)
    • Piuparts tested OK - https://piuparts.debian.org/sid/source/g/glibc.html
    • Not considered
news
[rss feed]
  • [2018-01-05] Accepted glibc 2.26.9000+20180105.a6d0afb5-0experimental0 (source) into experimental (Aurelien Jarno)
  • [2018-01-05] Accepted glibc 2.26-2 (source) into unstable (Aurelien Jarno)
  • [2018-01-03] Accepted glibc 2.26-1 (source) into unstable (Aurelien Jarno)
  • [2018-01-01] Accepted glibc 2.26-0experimental3 (source) into experimental (Aurelien Jarno)
  • [2017-12-31] Accepted glibc 2.25-6 (source) into unstable (Aurelien Jarno)
  • [2017-12-27] glibc 2.25-5 MIGRATED to testing (Debian testing watch)
  • [2017-12-17] Accepted glibc 2.26-0experimental2 (source) into experimental (Aurelien Jarno)
  • [2017-12-16] Accepted glibc 2.25-5 (source) into unstable (Aurelien Jarno)
  • [2017-12-12] Accepted glibc 2.25-4 (source) into unstable (Aurelien Jarno)
  • [2017-12-08] glibc 2.25-3 MIGRATED to testing (Debian testing watch)
  • [2017-12-02] Accepted glibc 2.24-11+deb9u2 (source) into proposed-updates->stable-new, proposed-updates (Aurelien Jarno)
  • [2017-12-02] Accepted glibc 2.25-3 (source) into unstable (Aurelien Jarno)
  • [2017-11-27] glibc 2.25-2 MIGRATED to testing (Debian testing watch)
  • [2017-11-22] Accepted glibc 2.26-0experimental1 (source) into experimental (Aurelien Jarno)
  • [2017-11-21] Accepted glibc 2.25-2 (source) into unstable (Aurelien Jarno)
  • [2017-11-19] Accepted glibc 2.26-0experimental0 (source) into experimental (Aurelien Jarno)
  • [2017-11-18] Accepted glibc 2.25-1 (source) into unstable (Aurelien Jarno)
  • [2017-11-14] Accepted glibc 2.25-0experimental4 (source) into experimental (Aurelien Jarno)
  • [2017-09-04] glibc 2.24-17 MIGRATED to testing (Debian testing watch)
  • [2017-08-27] Accepted glibc 2.25-0experimental3 (source) into experimental (Aurelien Jarno)
  • [2017-08-26] Accepted glibc 2.25-0experimental2 (source) into experimental (Aurelien Jarno)
  • [2017-08-26] Accepted glibc 2.24-17 (source) into unstable (Aurelien Jarno)
  • [2017-08-21] Accepted glibc 2.24-16 (source) into unstable (Aurelien Jarno)
  • [2017-08-20] Accepted glibc 2.25-0experimental1 (source) into experimental (Aurelien Jarno)
  • [2017-08-20] Accepted glibc 2.24-15 (source) into unstable (Aurelien Jarno)
  • [2017-08-20] glibc 2.24-14 MIGRATED to testing (Debian testing watch)
  • [2017-08-02] Accepted glibc 2.25-0experimental0 (source) into experimental (Aurelien Jarno)
  • [2017-08-01] Accepted glibc 2.24-14 (source) into unstable (Aurelien Jarno)
  • [2017-07-31] Accepted glibc 2.24-13 (source) into unstable (Aurelien Jarno)
  • [2017-06-24] Accepted glibc 2.19-18+deb8u10 (source all) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Aurelien Jarno)
  • 1
  • 2
bugs [bug history graph]
  • all: 436 462
  • RC: 1
  • I&N: 278 293
  • M&W: 156 166
  • F&P: 1 2
links
  • homepage
  • lintian (0, 145)
  • buildd: logs, exp, checks, clang, reproducibility
  • popcon
  • browse source code
  • edit tags
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.26-0ubuntu2
  • 310 bugs (4 patches)
  • patches for 2.26-0ubuntu2

Debian Package Tracker — Copyright 2013-2016 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Git Repository — How to contribute