import UBI glibc-2.34-168.el9_6.23
This commit is contained in:
parent
f23f792d9a
commit
cc2a2a379f
51
SOURCES/glibc-RHEL-104150.patch
Normal file
51
SOURCES/glibc-RHEL-104150.patch
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
commit cdcf24ee14c27b77744ff52ab3ae852821207eb0
|
||||||
|
Author: Florian Weimer <fweimer@redhat.com>
|
||||||
|
Date: Thu Jul 17 14:44:05 2025 +0200
|
||||||
|
|
||||||
|
iconv: iconv -o should not create executable files (bug 33164)
|
||||||
|
|
||||||
|
The mistake is that open must use 0666 to pick up the umask,
|
||||||
|
and not 0777 (which is required by mkdir).
|
||||||
|
|
||||||
|
Fixes commit 8ef3cff9d1ceafe369f982d980678d749fb93bd2
|
||||||
|
("iconv: Support in-place conversions (bug 10460, bug 32033)").
|
||||||
|
|
||||||
|
Reviewed-by: H.J. Lu <hjl.tools@gmail.com>
|
||||||
|
|
||||||
|
diff --git a/iconv/iconv_prog.c b/iconv/iconv_prog.c
|
||||||
|
index e3b051a309ff142b..08ea99d6adf6ea86 100644
|
||||||
|
--- a/iconv/iconv_prog.c
|
||||||
|
+++ b/iconv/iconv_prog.c
|
||||||
|
@@ -437,7 +437,7 @@ input_error (const char *path)
|
||||||
|
static void
|
||||||
|
open_output_direct (void)
|
||||||
|
{
|
||||||
|
- output_fd = open64 (output_file, O_WRONLY | O_CREAT | O_TRUNC, 0777);
|
||||||
|
+ output_fd = open64 (output_file, O_WRONLY | O_CREAT | O_TRUNC, 0666);
|
||||||
|
if (output_fd < 0)
|
||||||
|
output_error ();
|
||||||
|
}
|
||||||
|
@@ -458,7 +458,7 @@ prepare_output_file (char **argv)
|
||||||
|
else
|
||||||
|
{
|
||||||
|
/* If iconv creates the output file, no overlap is possible. */
|
||||||
|
- output_fd = open64 (output_file, O_WRONLY | O_CREAT | O_EXCL, 0777);
|
||||||
|
+ output_fd = open64 (output_file, O_WRONLY | O_CREAT | O_EXCL, 0666);
|
||||||
|
if (output_fd >= 0)
|
||||||
|
output_buffer_size = copy_buffer_size;
|
||||||
|
else
|
||||||
|
diff --git a/iconv/tst-iconv_prog-buffer.sh b/iconv/tst-iconv_prog-buffer.sh
|
||||||
|
index 23098ac56a344c48..562f90fe513e94d7 100644
|
||||||
|
--- a/iconv/tst-iconv_prog-buffer.sh
|
||||||
|
+++ b/iconv/tst-iconv_prog-buffer.sh
|
||||||
|
@@ -75,6 +75,10 @@ run_iconv () {
|
||||||
|
}
|
||||||
|
|
||||||
|
check_out_expected () {
|
||||||
|
+ if test -x "$tmp/out" ; then
|
||||||
|
+ echo "error: iconv output file is executable"
|
||||||
|
+ failure=true
|
||||||
|
+ fi
|
||||||
|
if ! cmp -s "$tmp/out" "$tmp/expected" ; then
|
||||||
|
echo "error: iconv output difference" >&$logfd
|
||||||
|
echo "*** expected ***" >&$logfd
|
233
SOURCES/glibc-RHEL-105328.patch
Normal file
233
SOURCES/glibc-RHEL-105328.patch
Normal file
@ -0,0 +1,233 @@
|
|||||||
|
commit 7ea06e994093fa0bcca0d0ee2c1db271d8d7885d
|
||||||
|
Author: Florian Weimer <fweimer@redhat.com>
|
||||||
|
Date: Mon Jul 21 21:43:49 2025 +0200
|
||||||
|
|
||||||
|
posix: Fix double-free after allocation failure in regcomp (bug 33185)
|
||||||
|
|
||||||
|
If a memory allocation failure occurs during bracket expression
|
||||||
|
parsing in regcomp, a double-free error may result.
|
||||||
|
|
||||||
|
Reported-by: Anastasia Belova <abelova@astralinux.ru>
|
||||||
|
Co-authored-by: Paul Eggert <eggert@cs.ucla.edu>
|
||||||
|
Reviewed-by: Andreas K. Huettel <dilfridge@gentoo.org>
|
||||||
|
|
||||||
|
Conflicts:
|
||||||
|
posix/Makefile
|
||||||
|
(tests list not reformatted downstream)
|
||||||
|
|
||||||
|
diff --git a/posix/Makefile b/posix/Makefile
|
||||||
|
index 4c32a088a73723c7..ef7a9ca31d9ee136 100644
|
||||||
|
--- a/posix/Makefile
|
||||||
|
+++ b/posix/Makefile
|
||||||
|
@@ -111,6 +111,7 @@ tests := test-errno tstgetopt testfnm runtests runptests \
|
||||||
|
tst-sched_getaffinity \
|
||||||
|
tst-cpuset-dynamic \
|
||||||
|
tst-cpuset-static \
|
||||||
|
+ tst-regcomp-bracket-free \
|
||||||
|
|
||||||
|
|
||||||
|
# Test for the glob symbol version that was replaced in glibc 2.27.
|
||||||
|
diff --git a/posix/regcomp.c b/posix/regcomp.c
|
||||||
|
index 887e5b50684e22f5..005e6459bbe8bd55 100644
|
||||||
|
--- a/posix/regcomp.c
|
||||||
|
+++ b/posix/regcomp.c
|
||||||
|
@@ -3365,6 +3365,7 @@ parse_bracket_exp (re_string_t *regexp, re_dfa_t *dfa, re_token_t *token,
|
||||||
|
{
|
||||||
|
#ifdef RE_ENABLE_I18N
|
||||||
|
free_charset (mbcset);
|
||||||
|
+ mbcset = NULL;
|
||||||
|
#endif
|
||||||
|
/* Build a tree for simple bracket. */
|
||||||
|
br_token.type = SIMPLE_BRACKET;
|
||||||
|
@@ -3380,7 +3381,8 @@ parse_bracket_exp (re_string_t *regexp, re_dfa_t *dfa, re_token_t *token,
|
||||||
|
parse_bracket_exp_free_return:
|
||||||
|
re_free (sbcset);
|
||||||
|
#ifdef RE_ENABLE_I18N
|
||||||
|
- free_charset (mbcset);
|
||||||
|
+ if (__glibc_likely (mbcset != NULL))
|
||||||
|
+ free_charset (mbcset);
|
||||||
|
#endif /* RE_ENABLE_I18N */
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
diff --git a/posix/tst-regcomp-bracket-free.c b/posix/tst-regcomp-bracket-free.c
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000000000..3c091d8c44ebe56f
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/posix/tst-regcomp-bracket-free.c
|
||||||
|
@@ -0,0 +1,176 @@
|
||||||
|
+/* Test regcomp bracket parsing with injected allocation failures (bug 33185).
|
||||||
|
+ Copyright (C) 2025 Free Software Foundation, Inc.
|
||||||
|
+ This file is part of the GNU C Library.
|
||||||
|
+
|
||||||
|
+ The GNU C Library is free software; you can redistribute it and/or
|
||||||
|
+ modify it under the terms of the GNU Lesser General Public
|
||||||
|
+ License as published by the Free Software Foundation; either
|
||||||
|
+ version 2.1 of the License, or (at your option) any later version.
|
||||||
|
+
|
||||||
|
+ The GNU C Library is distributed in the hope that it will be useful,
|
||||||
|
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
+ Lesser General Public License for more details.
|
||||||
|
+
|
||||||
|
+ You should have received a copy of the GNU Lesser General Public
|
||||||
|
+ License along with the GNU C Library; if not, see
|
||||||
|
+ <https://www.gnu.org/licenses/>. */
|
||||||
|
+
|
||||||
|
+/* This test invokes regcomp multiple times, failing one memory
|
||||||
|
+ allocation in each call. The function call should fail with
|
||||||
|
+ REG_ESPACE (or succeed if it can recover from the allocation
|
||||||
|
+ failure). Previously, there was double-free bug. */
|
||||||
|
+
|
||||||
|
+#include <errno.h>
|
||||||
|
+#include <regex.h>
|
||||||
|
+#include <stdio.h>
|
||||||
|
+#include <string.h>
|
||||||
|
+#include <support/check.h>
|
||||||
|
+#include <support/namespace.h>
|
||||||
|
+#include <support/support.h>
|
||||||
|
+
|
||||||
|
+/* Data structure allocated via MAP_SHARED, so that writes from the
|
||||||
|
+ subprocess are visible. */
|
||||||
|
+struct shared_data
|
||||||
|
+{
|
||||||
|
+ /* Number of tracked allocations performed so far. */
|
||||||
|
+ volatile unsigned int allocation_count;
|
||||||
|
+
|
||||||
|
+ /* If this number is reached, one allocation fails. */
|
||||||
|
+ volatile unsigned int failing_allocation;
|
||||||
|
+
|
||||||
|
+ /* The subprocess stores the expected name here. */
|
||||||
|
+ char name[100];
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+/* Allocation count in shared mapping. */
|
||||||
|
+static struct shared_data *shared;
|
||||||
|
+
|
||||||
|
+/* Returns true if a failure should be injected for this allocation. */
|
||||||
|
+static bool
|
||||||
|
+fail_this_allocation (void)
|
||||||
|
+{
|
||||||
|
+ if (shared != NULL)
|
||||||
|
+ {
|
||||||
|
+ unsigned int count = shared->allocation_count;
|
||||||
|
+ shared->allocation_count = count + 1;
|
||||||
|
+ return count == shared->failing_allocation;
|
||||||
|
+ }
|
||||||
|
+ else
|
||||||
|
+ return false;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/* Failure-injecting wrappers for allocation functions used by glibc. */
|
||||||
|
+
|
||||||
|
+void *
|
||||||
|
+malloc (size_t size)
|
||||||
|
+{
|
||||||
|
+ if (fail_this_allocation ())
|
||||||
|
+ {
|
||||||
|
+ errno = ENOMEM;
|
||||||
|
+ return NULL;
|
||||||
|
+ }
|
||||||
|
+ extern __typeof (malloc) __libc_malloc;
|
||||||
|
+ return __libc_malloc (size);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+void *
|
||||||
|
+calloc (size_t a, size_t b)
|
||||||
|
+{
|
||||||
|
+ if (fail_this_allocation ())
|
||||||
|
+ {
|
||||||
|
+ errno = ENOMEM;
|
||||||
|
+ return NULL;
|
||||||
|
+ }
|
||||||
|
+ extern __typeof (calloc) __libc_calloc;
|
||||||
|
+ return __libc_calloc (a, b);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+void *
|
||||||
|
+realloc (void *ptr, size_t size)
|
||||||
|
+{
|
||||||
|
+ if (fail_this_allocation ())
|
||||||
|
+ {
|
||||||
|
+ errno = ENOMEM;
|
||||||
|
+ return NULL;
|
||||||
|
+ }
|
||||||
|
+ extern __typeof (realloc) __libc_realloc;
|
||||||
|
+ return __libc_realloc (ptr, size);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/* No-op subprocess to verify that support_isolate_in_subprocess does
|
||||||
|
+ not perform any heap allocations. */
|
||||||
|
+static void
|
||||||
|
+no_op (void *ignored)
|
||||||
|
+{
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/* Perform a regcomp call in a subprocess. Used to count its
|
||||||
|
+ allocations. */
|
||||||
|
+static void
|
||||||
|
+initialize (void *regexp1)
|
||||||
|
+{
|
||||||
|
+ const char *regexp = regexp1;
|
||||||
|
+
|
||||||
|
+ shared->allocation_count = 0;
|
||||||
|
+
|
||||||
|
+ regex_t reg;
|
||||||
|
+ TEST_COMPARE (regcomp (®, regexp, 0), 0);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/* Perform regcomp in a subprocess with fault injection. */
|
||||||
|
+static void
|
||||||
|
+test_in_subprocess (void *regexp1)
|
||||||
|
+{
|
||||||
|
+ const char *regexp = regexp1;
|
||||||
|
+ unsigned int inject_at = shared->failing_allocation;
|
||||||
|
+
|
||||||
|
+ regex_t reg;
|
||||||
|
+ int ret = regcomp (®, regexp, 0);
|
||||||
|
+
|
||||||
|
+ if (ret != 0)
|
||||||
|
+ {
|
||||||
|
+ TEST_COMPARE (ret, REG_ESPACE);
|
||||||
|
+ printf ("info: allocation %u failure results in return value %d,"
|
||||||
|
+ " error %s (%d)\n",
|
||||||
|
+ inject_at, ret, strerrorname_np (errno), errno);
|
||||||
|
+ }
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+static int
|
||||||
|
+do_test (void)
|
||||||
|
+{
|
||||||
|
+ char regexp[] = "[:alpha:]";
|
||||||
|
+
|
||||||
|
+ shared = support_shared_allocate (sizeof (*shared));
|
||||||
|
+
|
||||||
|
+ /* Disable fault injection. */
|
||||||
|
+ shared->failing_allocation = ~0U;
|
||||||
|
+
|
||||||
|
+ support_isolate_in_subprocess (no_op, NULL);
|
||||||
|
+ TEST_COMPARE (shared->allocation_count, 0);
|
||||||
|
+
|
||||||
|
+ support_isolate_in_subprocess (initialize, regexp);
|
||||||
|
+
|
||||||
|
+ /* The number of allocations in the successful case, plus some
|
||||||
|
+ slack. Once the number of expected allocations is exceeded,
|
||||||
|
+ injecting further failures does not make a difference. */
|
||||||
|
+ unsigned int maximum_allocation_count = shared->allocation_count;
|
||||||
|
+ printf ("info: successful call performs %u allocations\n",
|
||||||
|
+ maximum_allocation_count);
|
||||||
|
+ maximum_allocation_count += 10;
|
||||||
|
+
|
||||||
|
+ for (unsigned int inject_at = 0; inject_at <= maximum_allocation_count;
|
||||||
|
+ ++inject_at)
|
||||||
|
+ {
|
||||||
|
+ shared->allocation_count = 0;
|
||||||
|
+ shared->failing_allocation = inject_at;
|
||||||
|
+ support_isolate_in_subprocess (test_in_subprocess, regexp);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ support_shared_free (shared);
|
||||||
|
+
|
||||||
|
+ return 0;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+#include <support/test-driver.c>
|
34
SOURCES/glibc-RHEL-106230.patch
Normal file
34
SOURCES/glibc-RHEL-106230.patch
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
commit 87afbd7a1ad9c1dd116921817fa97198171045db
|
||||||
|
Author: Sam James <sam@gentoo.org>
|
||||||
|
Date: Mon Jul 28 21:55:30 2025 +0100
|
||||||
|
|
||||||
|
inet-fortified: fix namespace violation (bug 33227)
|
||||||
|
|
||||||
|
We need to use __sz, not sz, as we do elsewhere.
|
||||||
|
|
||||||
|
Reviewed-by: Florian Weimer <fweimer@redhat.com>
|
||||||
|
|
||||||
|
diff --git a/inet/bits/inet-fortified.h b/inet/bits/inet-fortified.h
|
||||||
|
index 8420a4b7fb41086f..5d16b1f871c49e6f 100644
|
||||||
|
--- a/inet/bits/inet-fortified.h
|
||||||
|
+++ b/inet/bits/inet-fortified.h
|
||||||
|
@@ -38,15 +38,15 @@ __fortify_function int
|
||||||
|
__NTH (inet_pton (int __af, const char *__restrict __src,
|
||||||
|
void * __restrict __dst))
|
||||||
|
{
|
||||||
|
- size_t sz = 0;
|
||||||
|
+ size_t __sz = 0;
|
||||||
|
if (__af == AF_INET)
|
||||||
|
- sz = sizeof (struct in_addr);
|
||||||
|
+ __sz = sizeof (struct in_addr);
|
||||||
|
else if (__af == AF_INET6)
|
||||||
|
- sz = sizeof (struct in6_addr);
|
||||||
|
+ __sz = sizeof (struct in6_addr);
|
||||||
|
else
|
||||||
|
return __inet_pton_alias (__af, __src, __dst);
|
||||||
|
|
||||||
|
- return __glibc_fortify (inet_pton, sz, sizeof (char),
|
||||||
|
+ return __glibc_fortify (inet_pton, __sz, sizeof (char),
|
||||||
|
__glibc_objsize (__dst),
|
||||||
|
__af, __src, __dst);
|
||||||
|
};
|
@ -157,7 +157,7 @@ end \
|
|||||||
Summary: The GNU libc libraries
|
Summary: The GNU libc libraries
|
||||||
Name: glibc
|
Name: glibc
|
||||||
Version: %{glibcversion}
|
Version: %{glibcversion}
|
||||||
Release: 168%{?dist}.20
|
Release: 168%{?dist}.23
|
||||||
|
|
||||||
# In general, GPLv2+ is used by programs, LGPLv2+ is used for
|
# In general, GPLv2+ is used by programs, LGPLv2+ is used for
|
||||||
# libraries.
|
# libraries.
|
||||||
@ -1181,6 +1181,9 @@ Patch873: glibc-RHEL-93877.patch
|
|||||||
Patch874: glibc-RHEL-95547-1.patch
|
Patch874: glibc-RHEL-95547-1.patch
|
||||||
Patch875: glibc-RHEL-95547-2.patch
|
Patch875: glibc-RHEL-95547-2.patch
|
||||||
Patch876: glibc-RHEL-95547-3.patch
|
Patch876: glibc-RHEL-95547-3.patch
|
||||||
|
Patch877: glibc-RHEL-104150.patch
|
||||||
|
Patch878: glibc-RHEL-105328.patch
|
||||||
|
Patch879: glibc-RHEL-106230.patch
|
||||||
|
|
||||||
##############################################################################
|
##############################################################################
|
||||||
# Continued list of core "glibc" package information:
|
# Continued list of core "glibc" package information:
|
||||||
@ -3174,6 +3177,15 @@ update_gconv_modules_cache ()
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Jul 29 2025 Florian Weimer <fweimer@redhat.com> - 2.34-168.23
|
||||||
|
- Fix namespace pollution in inet_ntop with fortification (RHEL-106230)
|
||||||
|
|
||||||
|
* Thu Jul 24 2025 Florian Weimer <fweimer@redhat.com> - 2.34-168.22
|
||||||
|
- CVE-2025-8058: Double free in regcomp (RHEL-105328)
|
||||||
|
|
||||||
|
* Wed Jul 23 2025 Florian Weimer <fweimer@redhat.com> - 2.34-168.21
|
||||||
|
- iconv: Do not create executable output files (RHEL-104150)
|
||||||
|
|
||||||
* Mon Jun 16 2025 Frédéric Bérat <fberat@redhat.com> - 2.34-168.20
|
* Mon Jun 16 2025 Frédéric Bérat <fberat@redhat.com> - 2.34-168.20
|
||||||
- CVE-2025-5702 glibc: Vector register overwrite bug in glibc (RHEL-95547)
|
- CVE-2025-5702 glibc: Vector register overwrite bug in glibc (RHEL-95547)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user