Your message dated Fri, 27 Mar 2026 21:18:58 +0000
with message-id <[email protected]>
and subject line Bug#1129746: fixed in glibc 2.42-14
has caused the Debian Bug report #1129746,
regarding glibc is not built with -fstack-clash-protection (despite it being in 
dpkg-buildflags)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1129746: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1129746
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libc6
Version: 2.42-13

My understanding is that dpkg-buildflags defaults include
-fstack-clash-protection (see
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=11efff1bf), but
somehow Debian's glibc appears to not be built with
-fstack-clash-protection; there are unprotected large stack
allocations in functions like ____strtold_l_internal,
____strtof128_l_internal, tempnam, tmpfile64, and more:

$ wget http://ftp.ch.debian.org/debian/pool/main/g/glibc/libc6_2.42-13_amd64.deb
[...]
$ ar x libc6_2.42-13_amd64.deb
$ tar xf data.tar.xz
$ objdump -d usr/lib/x86_64-linux-gnu/libc.so.6 | egrep 'sub
*\$0x.{4,},%rsp' | grep -v 0xffffff
   51763:       48 81 ec 48 36 00 00    sub    $0x3648,%rsp
   573c2:       48 81 ec 88 36 00 00    sub    $0x3688,%rsp
   611ca:       48 81 ec 10 10 00 00    sub    $0x1010,%rsp
   617a3:       48 81 ec 28 10 00 00    sub    $0x1028,%rsp
   a14f1:       48 81 ec b8 11 00 00    sub    $0x11b8,%rsp
   adeef:       48 81 ec 10 40 00 00    sub    $0x4010,%rsp
   adf11:       48 81 ec 10 10 00 00    sub    $0x1010,%rsp
   c8de0:       48 81 ec 58 36 00 00    sub    $0x3658,%rsp
   cb762:       48 81 ec 10 40 00 00    sub    $0x4010,%rsp
   cb775:       48 81 ec 10 10 00 00    sub    $0x1010,%rsp
   cde80:       48 81 ec 88 36 00 00    sub    $0x3688,%rsp
   e21ed:       48 81 ec d8 28 00 00    sub    $0x28d8,%rsp
   ea72d:       48 81 ec a8 15 00 00    sub    $0x15a8,%rsp
   f395e:       48 81 ec c8 48 00 00    sub    $0x48c8,%rsp
  106762:       48 81 ec 18 10 00 00    sub    $0x1018,%rsp
  10b160:       48 81 ec 18 10 00 00    sub    $0x1018,%rsp
  126a0b:       48 81 ec 00 10 00 00    sub    $0x1000,%rsp
  12d2ca:       48 81 ec 18 20 00 00    sub    $0x2018,%rsp
  14fb59:       48 81 ec c8 29 00 00    sub    $0x29c8,%rsp
  150d76:       48 81 ec 88 22 00 00    sub    $0x2288,%rsp
  161fee:       48 81 ec c0 11 00 00    sub    $0x11c0,%rsp
  162530:       48 81 ec 48 10 00 00    sub    $0x1048,%rsp

Since glibc does not have stack clash protection, the stack clash
protection of any software that calls glibc functions with large stack
frames is also less effective.

Can you please also build glibc with -fstack-clash-protection?

--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.42-14
Done: Aurelien Jarno <[email protected]>

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno <[email protected]> (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 27 Mar 2026 22:08:16 +0100
Source: glibc
Architecture: source
Version: 2.42-14
Distribution: unstable
Urgency: medium
Maintainer: GNU Libc Maintainers <[email protected]>
Changed-By: Aurelien Jarno <[email protected]>
Closes: 113887 1128631 1129746 1131435
Changes:
 glibc (2.42-14) unstable; urgency=medium
 .
   [ Samuel Thibault ]
   * debian/patches/hurd-i386/git-mach_send_eintr.diff: Fix assertion failure
     on eintr during message send.
   * debian/patches/hurd-i386/git-itimer-lock.diff: Fix setitimer mutex
     inversion.
   * debian/patches/hurd-i386/git-posix-timers.diff: Set _POSIX_TIMERS to
     200809L.  Closes: #1128631.
   * debian/patches/hurd-i386/sig-alarm.diff: Fix it_interval in setitimer, thus
     alarm too, on hurd-amd64.
   * debian/patches/hurd-i386/git-libio-mtsafe.diff: Fix mt-safeness of libio.
   * debian/patches/hurd-i386/git-cancel-sig.diff: Complete fix.
   * debian/patches/hurd-i386/git-timedrwlock-unlock.diff: Fix race between
     timedrd/wrlock and unlock.
   * debian/patches/hurd-i386/git-sigtimedwait-timeout.diff: Fix cleaning on
     sigtimedwait timing out.
   * debian/testsuite-xfail-debian.mk: Update for 2.44.
 .
   [ Aurelien Jarno ]
   * debian/sysdeps/mips*.mk: rename extra passes to matche the dpkg
     architecture name.
   * debian/rules.d/build.mk: add a makefile function that queries the dpkg
     build flags for the current pass.
   * debian/rules.d/build.mk: enable stack protection depending on
     -fstack-protector* flags returned by dpkg-buildflags.
   * debian/rules.d/build.mk: add a makefile function to filter out dpkg build
     flags incompatible with glibc and define CFLAGS from dpkg build flags.
     Closes: #1129746.
   * debian/control.in/{libc,i386}: downgrade the libdpkg-dev break to the
     trixie version now that bug#1122107 got fixed in trixie. Also apply it to
     amd64 and x32, as they are also using symbol versions used as ABI flag.
     Limit the break to libc6, multilib packages will get the break
     transitively through the strict depends.
   * debian/symbols.wildcards: adjust ABI flags version, we need to match the
     first version where the flag got introduced, not the first version where
     the fix got introduced.
   * debian/patches/git-updates.diff: update from upstream stable branch:
     - Fix a null pointer dereference in the nss_database_check_reload_and_get
       function.
     - Fix invalid pointer arithmetic in ANSI_X3.110 iconv module
     - Fix a typo preventing new tst-wordexp-reuse-mem to run
     - Fix incorrect handling of DNS responses in gethostbyaddr and
       gethostbyaddr_r (CVE-2026-4437).  Closes: #1131435.
     - Fix invalid DNS hostnames returned by gethostbyaddr and
       gethostbyaddr_r (CVE-2026-4438).  Closes: #113887.
Checksums-Sha1:
 201cd708522f3efa36ffc9a5eaf8ce45c59948c4 8576 glibc_2.42-14.dsc
 435bf948125353cd5bbfcf16b9697e9e58fbb1b5 433760 glibc_2.42-14.debian.tar.xz
 3efa3fa699aca44bd9f78ea88a4d88c5518d0ccb 9572 glibc_2.42-14_source.buildinfo
Checksums-Sha256:
 5a53b0b21a749cb8937c87b6dc57074d062dc0c1b42c57f4337fe7de3855721a 8576 
glibc_2.42-14.dsc
 f3cdcf45ccf89a022fe5d28fa98240b6371fda962b01a951c0f2bfe2ee1515e7 433760 
glibc_2.42-14.debian.tar.xz
 3572e837cfe21c53dd372598472c20e36eddbac38f4e61b8d93db34c3b030c02 9572 
glibc_2.42-14_source.buildinfo
Files:
 cb018a3510052d139912d95f51d2c306 8576 libs required glibc_2.42-14.dsc
 2a280cc4006ab5e99f72a5ba9d09e298 433760 libs required 
glibc_2.42-14.debian.tar.xz
 049d3e449de385ce5495944db48b8421 9572 libs required 
glibc_2.42-14_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=MjZo
-----END PGP SIGNATURE-----

Attachment: pgp5_y2nfN2pH.pgp
Description: PGP signature


--- End Message ---

Reply via email to