[PATCH 01/11] toolchain: glibc: update to latest 2.34 HEAD

Hauke Mehrtens hauke at hauke-m.de
Sun Jan 30 08:25:28 PST 2022


e64235ff42 powerpc: Fix unrecognized instruction errors with recent GCC
73558ffe84 Update syscall lists for Linux 5.15
2fe2af88ab i386: Remove broken CAN_USE_REGISTER_ASM_EBP (bug 28771)
705f1e4606 Update syscall lists for Linux 5.16
03e6e02e6a Disable debuginfod in printer tests [BZ #28757]
5575daae50 socket: Add the __sockaddr_un_set function
7b5d433fd0 CVE-2022-23219: Buffer overflow in sunrpc clnt_create for "unix" (bug 22542)
1081f1d3dd sunrpc: Test case for clnt_create "unix" buffer overflow (bug 22542)
6890b8a3ae CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bug 28768)
1d401d1fcc x86: use default cache size if it cannot be determined [BZ #28784]
82b1acd9de powerpc: Fix unrecognized instruction errors with recent binutils
062ff490c1 support: Add helpers to create paths longer than PATH_MAX
269eb9d930 stdlib: Sort tests in Makefile
73c362840c stdlib: Fix formatting of tests list in Makefile
f7a79879c0 realpath: Set errno to ENAMETOOLONG for result larger than PATH_MAX [BZ #28770]
8c8a71c85f tst-realpath-toolong: Fix hurd build
472e799a5f getcwd: Set errno to ERANGE for size == 1 (CVE-2021-3999)
d084965adc realpath: Avoid overwriting preexisting error (CVE-2021-3998)
3438bbca90 Linux: Detect user namespace support in io/tst-getcwd-smallbuff
1b9cd6a721 NEWS: add bug entry for BZ #28769 and BZ #28770
b50d5b746c x86: Fix __wcsncmp_avx2 in strcmp-avx2.S [BZ# 28755]
08beb3a3f4 x86: Fix __wcsncmp_evex in strcmp-evex.S [BZ# 28755]
72123e1b56 NEWS: Add a bug entry for BZ #28755

This fixes multiple bugs including the following security problems:
CVE-2022-23219: Buffer overflow in sunrpc clnt_create for "unix"
CVE-2022-23218: Buffer overflow in sunrpc svcunix_create
CVE-2021-3999: Off-by-one buffer overflow/underflow in getcwd()
CVE-2021-3998: Unexpected return value from realpath() for too long results

Signed-off-by: Hauke Mehrtens <hauke at hauke-m.de>
---
 toolchain/glibc/common.mk | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/toolchain/glibc/common.mk b/toolchain/glibc/common.mk
index e957ff52e509..51d13c457ead 100644
--- a/toolchain/glibc/common.mk
+++ b/toolchain/glibc/common.mk
@@ -12,8 +12,8 @@ PKG_RELEASE:=1
 
 PKG_SOURCE_PROTO:=git
 PKG_SOURCE_SUBDIR:=$(PKG_NAME)-$(PKG_VERSION)
-PKG_SOURCE_VERSION:=d5ba02f67dd62a63e29c29eebd6c543722aa6b5b
-PKG_MIRROR_HASH:=19e49929c7ea3480a0d1213b6763a23a5ed8129a34fe201a985498927c583ce1
+PKG_SOURCE_VERSION:=72123e1b56f53f9205bb105f8a62d0869b837b22
+PKG_MIRROR_HASH:=934ec7067d41da0b76b8f29a1cd03b10ba9d98c2f761f7b32f8595e59ac2b428
 PKG_SOURCE_URL:=https://sourceware.org/git/glibc.git
 PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION)-$(PKG_SOURCE_VERSION).tar.xz
 
-- 
2.30.2




More information about the openwrt-devel mailing list