| Message ID | 20260410120908.2669458-1-Hemanth.KumarMD@windriver.com |
|---|---|
| State | New |
| Headers | show |
| Series | [whinlatter] glibc: stable 2.42 branch updates | expand |
Hello, This patch depends on the related whinlatter backport series addressing build issues with newer glibc: https://lists.openembedded.org/g/openembedded-core/message/235011?p=%2C%2C%2C20%2C0%2C0%2C0%3A%3ACreated%2C%2C%5Bwhinlatter%5D%5BPATCH+1%2F9%5D+dtc%3A+backport+fix+for+build+with+glibc-2.43%2C20%2C2%2C0%2C118744346 <https://lists.openembedded.org/g/openembedded-core/message/235011?p=%2C%2C%2C20%2C0%2C0%2C0%3A%3ACreated%2C%2C%5Bwhinlatter%5D%5BPATCH+1%2F9%5D+dtc%3A+backport+fix+for+build+with+glibc-2.43%2C20%2C2%2C0%2C118744346> On 10-04-2026 05:39 pm, Hemanth.KumarMD@windriver.com wrote: > From: Hemanth Kumar M D<Hemanth.KumarMD@windriver.com> > > $ git log --oneline 912d89a766847649a3857985a3b5e6065c51bfd4..a56a2943d2ce541102c630142c2eae0fbfc5886b > > a56a2943d2 tests: fix tst-rseq with Linux 7.0 > 68099ccc94 elf: parse /proc/self/maps as the last resort to find the gap for tst-link-map-contiguous-ldso > 426378547e resolv: Check hostname for validity (CVE-2026-4438) > 8e863fb1c9 resolv: Count records correctly (CVE-2026-4437) > 1a19d5a507 posix: Run tst-wordexp-reuse-mem test > 9cd9c90544 iconvdata: Fix invalid pointer arithmetic in ANSI_X3.110 module > ebd45473f5 nss: Missing checks in __nss_configure_lookup, __nss_database_get (bug 28940) > 937ef7aaf3 Linux: In getlogin_r, use utmp fallback only for specific errors > 3989780591 nss: Introduce dedicated struct nss_database_for_fork type > > Testing Results: > +--------------+--------+--------+------+ > | Result | Before | After | Diff | > +--------------+--------+--------+------+ > | PASS | 6934 | 6938 | +4 | > | XPASS | 4 | 4 | 0 | > | FAIL | 76 | 75 | -1 | > | XFAIL | 16 | 16 | 0 | > | UNSUPPORTED | 108 | 109 | +1 | > +--------------+--------+--------+------+ > > Changes in testcases: > +------------------------------------------------------+--------+-------------+ > | Testcase | Before | After | > +------------------------------------------------------+--------+-------------+ > | elf/tst-glibc-hwcaps | FAIL | PASS | > | elf/tst-ldconfig-soname | FAIL | PASS | > | nptl/tst-thread-affinity-pthread2 | PASS | FAIL | > | nss/tst-nss-malloc-failure-getlogin_r | N/A | UNSUPPORTED | > | posix/tst-wordexp-reuse-mem | N/A | PASS | > | resolv/tst-resolv-dns-section | N/A | PASS | > | resolv/tst-resolv-invalid-ptr | N/A | PASS | > +------------------------------------------------------+--------+-------------+ > > Signed-off-by: Hemanth Kumar M D<Hemanth.KumarMD@windriver.com> > --- > meta/recipes-core/glibc/glibc-version.inc | 2 +- > meta/recipes-core/glibc/glibc_2.42.bb | 2 +- > 2 files changed, 2 insertions(+), 2 deletions(-) > > diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc > index 9991c02495..9f1003570d 100644 > --- a/meta/recipes-core/glibc/glibc-version.inc > +++ b/meta/recipes-core/glibc/glibc-version.inc > @@ -1,6 +1,6 @@ > SRCBRANCH ?= "release/2.42/master" > PV = "2.42+git" > -SRCREV_glibc ?= "912d89a766847649a3857985a3b5e6065c51bfd4" > +SRCREV_glibc ?= "a56a2943d2ce541102c630142c2eae0fbfc5886b" > SRCREV_localedef ?= "cba02c503d7c853a38ccfb83c57e343ca5ecd7e5" > > GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https" diff --git a/meta/recipes-core/glibc/glibc_2.42.bb > b/meta/recipes-core/glibc/glibc_2.42.bb index a8717c0eae..7e0aa3d5fc > 100644 --- a/meta/recipes-core/glibc/glibc_2.42.bb +++ > b/meta/recipes-core/glibc/glibc_2.42.bb @@ -17,7 +17,7 @@ Allows for > ASLR bypass so can bypass some hardening, not an exploit in itself, m > easier access for another. 'ASLR bypass itself is not a vulnerability.'" > > CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS" > -CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915" > +CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915 CVE-2026-4437 CVE-2026-4438" > CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix available in used git hash" > > DEPENDS += "gperf-native bison-native"
diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc index 9991c02495..9f1003570d 100644 --- a/meta/recipes-core/glibc/glibc-version.inc +++ b/meta/recipes-core/glibc/glibc-version.inc @@ -1,6 +1,6 @@ SRCBRANCH ?= "release/2.42/master" PV = "2.42+git" -SRCREV_glibc ?= "912d89a766847649a3857985a3b5e6065c51bfd4" +SRCREV_glibc ?= "a56a2943d2ce541102c630142c2eae0fbfc5886b" SRCREV_localedef ?= "cba02c503d7c853a38ccfb83c57e343ca5ecd7e5" GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https" diff --git a/meta/recipes-core/glibc/glibc_2.42.bb b/meta/recipes-core/glibc/glibc_2.42.bb index a8717c0eae..7e0aa3d5fc 100644 --- a/meta/recipes-core/glibc/glibc_2.42.bb +++ b/meta/recipes-core/glibc/glibc_2.42.bb @@ -17,7 +17,7 @@ Allows for ASLR bypass so can bypass some hardening, not an exploit in itself, m easier access for another. 'ASLR bypass itself is not a vulnerability.'" CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS" -CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915" +CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915 CVE-2026-4437 CVE-2026-4438" CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix available in used git hash" DEPENDS += "gperf-native bison-native"