Thank you for your contribution to Debian.

Mapping trixie to stable.
Mapping stable to proposed-updates.

Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 01 Mar 2026 21:10:06 +0100
Source: glibc
Architecture: source
Version: 2.41-12+deb13u2
Distribution: trixie
Urgency: medium
Maintainer: GNU Libc Maintainers <[email protected]>
Changed-By: Aurelien Jarno <[email protected]>
Closes: 1125678 1125748 1126266
Changes:
 glibc (2.41-12+deb13u2) trixie; urgency=medium
 .
   * debian/patches/git-updates.diff: update from upstream stable branch:
     - Fix a null pointer dereference in <ctype.h> macros in multithreaded
       programs with multiple libc.so.
     - Fix _r_debug handling when interposed by the main executable, restoring
       compatibility with Dyninst.
     - Fix a null pointer dereference in symbol lookup when the symbol version
       hash value is zero.
     - Add a new test for dlopen (NULL, RTLD_LAZY) from an ELF constructor.
     - Preserve vector registers in the i386 TLS slow path.
     - Add GLIBC_ABI_GNU2_TLS and GLIBC_ABI_GNU_TLS symbol versions and i386.
     - Add GLIBC_ABI_GNU2_TLS and GLIBC_ABI_DT_X86_64_PLT symbol versions on
       amd64.
     - Fix NSS group merge not reacting to ERANGE during merge.
     - Detect Intel Nova and Wildcat processors and use the same ifunc
       selection as for Intel Panther Lake.
     - Fix typo in wmemset ifunc selector that caused AVX2/AVX512 paths to be
       skipped.
     - Fix incorrect return values and improve special case handling in arm64
       SVE pow/powf and tanpi/tanpif implementations.
     - Optimise SVE scalar callbacks on arm64.
     - Correct SME handling on arm64 by disabling ZA state in setjmp and
       sigsetjmp, clearing ZA state in clone/clone3.
     - Fix conform tests on arm64 when the toolchain does not default to
       -mbranch-protection=standard.
     - Fix performance instability in AdvSIMD tan and sinh function on arm64
     - Fix and restore POWER10 optimized strcmp/strncmp functions on ppc64el,
       they got previously disabled 2.41-8 due to a security issue.
     - Fix POWER optimized rawmemchr function on ppc64el.
     - Validate pread size and offset for overflow when reading ELF
       headers in the sprof utility.
     - Minor fixes to testsuite support code.
     - Optimize trylock for high cache contention workloads.
     - Fix and integer overflow in _int_memalign leading to heap corruption
       (CVE-2026-0861).  Closes: #1125678.
     - Fix stack contents leak in getnetbyaddr (CVE-2026-0915).  Closes:
       #1125748.
     - Fix bug in wordexp, which could return uninitialized memory when using
       WRDE_REUSE together with WRDE_APPEND (CVE-2025-15281).  Closes: #1126266.
     - Switch currency symbol for the bg_BG locale to euro.
   * Revert addition of symbol versions used as ABI flags, as the
     dpkg-shlibdeps version in trixie is not able to handle them (see
     #1122107):
     - local-revert-x86-64-add-GLIBC_ABI_DT_X86_64_PLT-version.diff
     - local-revert-x86-64-add-GLIBC_ABI_GNU2_TLS-version.diff
     - local-revert-i386-add-GLIBC_ABI_GNU2_TLS-version.diff
     - local-revert-i386-add-GLIBC_ABI_GNU_TLS-version.diff
Checksums-Sha1:
 cdc5cca8fb3273513a1c358e3e749335cf89a8bc 7576 glibc_2.41-12+deb13u2.dsc
 1ab762affee966b786b0f67f54e536da7e6876ef 485960 
glibc_2.41-12+deb13u2.debian.tar.xz
 3664a17eae854da41aa6ec2b4f8ffdbb06125680 9662 
glibc_2.41-12+deb13u2_source.buildinfo
Checksums-Sha256:
 f98b6ede834c35af07c543370af25b27126245049395e9a83dbbf548f5dc6d93 7576 
glibc_2.41-12+deb13u2.dsc
 30370dc7ebf973c51465b924d3f1637a0177708aa2bf05bf295ab1427fb8813a 485960 
glibc_2.41-12+deb13u2.debian.tar.xz
 5ff008db89274f14368d76a2d4a138b63a6b2088c315a04fda3896c4de3cf1ca 9662 
glibc_2.41-12+deb13u2_source.buildinfo
Files:
 d24b657472af889820c0d35a67fbaa69 7576 libs required glibc_2.41-12+deb13u2.dsc
 26122ba8d0d2d37893f0b6a285dfefbe 485960 libs required 
glibc_2.41-12+deb13u2.debian.tar.xz
 8aa44250336fe82134fd0bb8cc419cde 9662 libs required 
glibc_2.41-12+deb13u2_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEUryGlb40+QrX1Ay4E4jA+JnoM2sFAmmmAsMACgkQE4jA+Jno
M2sgVQ//Z12jT/ka1J+gC4rgNO0+Nxp1uSdbGcFqhc8fye9ZwjyJOY51y8avws9T
M+SsyxfMRHVrKZKuXm6qIqTI+8Ofh1MPyjI90sL0mls2WIwyYAuPOls5Y8NV/BZi
XtBXKk0RfZwOSiHXH8JfMRsaAYZi+dGG5Z812cS5hYy+EW+PvzwNb0N58iqT8Egw
AE41UJM/iAZIV1YC9NGvPpBayua6hoLu5zyY7XMCq85Jy3dOiGITlhLfWqV4Zadf
osVvy51rDht2AmroICdmWjDz3S34bVVGaWgPsdFsytHHD6T8fstnocrOkuCRCosQ
VlM5xxuqkLmIlZiaKM2Jp09QiXl0rQsu6pcm3LdGuslQhtCV8/3dpWlJGQSylInN
UleKDZmG6RwVSVHKPDMEqQL7gnu3CBZZz33jhy9wZ2d9l+yQjg5hqcDnOBc7x0Uy
l2NZ96ERETRebbCi2RM7iyba8+wiet2NVU382oxn1wfz9XkEuiuJmoKOrHzRoy1I
TEk/FCNNK5Ic624cKQq58VDtRaHcpPzsb+MWJfjkVD22OR2Z+drMF2f5dADcPSUy
7TcnJXTC8nyU5qDSku7QI4mUEYqXMgAyCyvQwwwDDvcJ4LJNG5vkRkrSxcDu92Fi
7j0Asxe+qQji1zWsYDRbu18xuKICX2wKxMsTbjZvecpyclf5ZNE=
=mIAp
-----END PGP SIGNATURE-----

Attachment: pgpxPUFE77K0I.pgp
Description: PGP signature

Reply via email to