Source: glibc
Version: 2.19-18
Severity: important
Tags: security upstream
Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=17905
Hi,
the following vulnerability was published for glibc.
CVE-2015-8779[0]:
catopen() Multiple unbounded stack allocations
If you fix the vulnerability plea
Processing commands for cont...@bugs.debian.org:
> tag 810322 pending
Bug #810322 {Done: Aurelien Jarno } [libc6] libc6:amd64:
Unexpected asseration in pthread_mutex_unlock()
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
810322: http://bug
Processing commands for cont...@bugs.debian.org:
> fixed 812445 2.21-7
Bug #812445 [src:glibc] glibc: CVE-2015-8776: Segmentation fault caused by
passing out-of-range data to strftime()
The source 'glibc' and version '2.21-7' do not appear to match any binary
packages
Marked as fixed in versions
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 24 Jan 2016 00:21:18 +0100
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic
libc6-udeb libc6.1 libc6.1-de
glibc_2.21-7_source.changes uploaded successfully to localhost
along with the files:
glibc_2.21-7.dsc
glibc_2.21-7.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
This is an automated email from the git hooks/post-receive script.
aurel32 pushed a change to branch sid
in repository glibc.
from 74bef2c Fix wrong assertion in pthread_mutex_unlock()
adds 46e2752 releasing package glibc version 2.21-7
new 9e41d9d New changelog entry
This is an automated email from the git hooks/post-receive script.
aurel32 pushed a change to annotated tag debian/2.21-7
in repository glibc.
at 64d3020 (tag)
tagging 46e27525dd169fad7ad2601e208db999d2c4e334 (commit)
replaces debian/2.21-6
tagged by Aurelien Jarno
on
Source: glibc
Version: 2.19-18
Severity: important
Tags: security upstream
Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=18985
Hi,
the following vulnerability was published for glibc.
CVE-2015-8776[0]:
Passing out of range data to strftime() causes a segfault
If you fix the vulnera
Your message dated Sat, 23 Jan 2016 23:34:55 +
with message-id
and subject line Bug#812351: fixed in glibc 2.21-7
has caused the Debian Bug report #812351,
regarding glibc: [INTL:nl] Dutch translation of debconf messages
to be marked as done.
This means that you claim that the problem has bee
Your message dated Sat, 23 Jan 2016 23:34:54 +
with message-id
and subject line Bug#809636: fixed in glibc 2.21-7
has caused the Debian Bug report #809636,
regarding glibc: [INTL:fr] French debconf templates translation update
to be marked as done.
This means that you claim that the problem h
Your message dated Sat, 23 Jan 2016 23:34:54 +
with message-id
and subject line Bug#810053: fixed in glibc 2.21-7
has caused the Debian Bug report #810053,
regarding glibc: Fix dladdr and nss Bug#791537 on hppa
to be marked as done.
This means that you claim that the problem has been dealt wi
Your message dated Sat, 23 Jan 2016 23:34:54 +
with message-id
and subject line Bug#809776: fixed in glibc 2.21-7
has caused the Debian Bug report #809776,
regarding glibc: Please add patch to support HUGE PAGES on hppa
to be marked as done.
This means that you claim that the problem has been
Your message dated Sat, 23 Jan 2016 23:34:54 +
with message-id
and subject line Bug#808143: fixed in glibc 2.21-7
has caused the Debian Bug report #808143,
regarding bg_BG locale should use colon as time separator, not comma
to be marked as done.
This means that you claim that the problem has
Source: glibc
Version: 2.19-18
Severity: important
Tags: security upstream
Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=18240
Hi,
the following vulnerability was published for glibc.
CVE-2015-8778[0]:
Integer overflow in hcreate and hcreate_r
If you fix the vulnerability please al
Your message dated Sat, 23 Jan 2016 23:34:54 +
with message-id
and subject line Bug#800900: fixed in glibc 2.21-7
has caused the Debian Bug report #800900,
regarding hurd-i386: changeset from r6489 breaks SIGBUS handling
to be marked as done.
This means that you claim that the problem has bee
Your message dated Sat, 23 Jan 2016 23:34:54 +
with message-id
and subject line Bug#809741: fixed in glibc 2.21-7
has caused the Debian Bug report #809741,
regarding glibc: [INTL:pt_BR] Brazilian Portuguese debconf templates translation
to be marked as done.
This means that you claim that the
Your message dated Sat, 23 Jan 2016 23:34:54 +
with message-id
and subject line Bug#810322: fixed in glibc 2.21-7
has caused the Debian Bug report #810322,
regarding libc6:amd64: Unexpected asseration in pthread_mutex_unlock()
to be marked as done.
This means that you claim that the problem h
This is an automated email from the git hooks/post-receive script.
aurel32 pushed a commit to branch sid
in repository glibc.
commit 9e41d9ddedf8862fb37091df2a3d3ffcd6d39c4f
Author: Aurelien Jarno
Date: Sun Jan 24 00:32:27 2016 +0100
New changelog entry
---
debian/changelog | 6 ++
1
This is an automated email from the git hooks/post-receive script.
aurel32 pushed a commit to branch glibc-2.22
in repository glibc.
commit cafff52ac961fd04d4243b42b27526a6b77cd3ec
Author: Aurelien Jarno
Date: Fri Jan 22 22:31:51 2016 +0100
Remove ldconfig wrapper, new debhelper versions
Hello dear maintainer(s),
the Debian LTS team would like to fix the security issues which are
currently open in the Squeeze version of eglibc:
https://security-tracker.debian.org/tracker/CVE-2014-9761
https://security-tracker.debian.org/tracker/CVE-2015-8776
https://security-tracker.debian.org/tr
Package: libc6
Severity: normal
Tags: upstream
Dear Maintainer,
I believe that realloc(x, malloc_usage_size(x)) should possibly extend
the size of the allocation of x, but not move it in memory. glibc
appears to return a new block of memory for this idiom when the block is
already "large", presu
21 matches
Mail list logo