[ubuntu/impish-proposed] klibc 2.0.8-6.1ubuntu2 (Accepted)

Lukas Märdian slyon at ubuntu.com
Mon Aug 9 14:53:11 UTC 2021


klibc (2.0.8-6.1ubuntu2) impish; urgency=medium

  * Merge with Debian; remaining changes:
    - Keep Ubuntu specific debian/patches/cf-protection.patch
  * Add debian/patches/armhf-min-fpu.patch for GCC-11 compatibility

klibc (2.0.8-6.1) unstable; urgency=medium

  * Non-maintainer upload.
  * {set,long}jmp [s390x]: save/restore the correct FPU registers
    (f8‥f15 not f1/f3/f5/f7) (Closes: #943425)

klibc (2.0.8-6) unstable; urgency=medium

  * Upload to unstable
  * malloc: Set errno on failure
  * malloc: Fail if requested size > PTRDIFF_MAX (CVE-2021-31873)
  * calloc: Fail if multiplication overflows (CVE-2021-31870)
  * cpio: Fix possible integer overflow on 32-bit systems (CVE-2021-31872)
  * cpio: Fix possible crash on 64-bit systems (CVE-2021-31871)

Date: Mon, 09 Aug 2021 16:46:29 +0200
Changed-By: Lukas Märdian <slyon at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/klibc/2.0.8-6.1ubuntu2
-------------- next part --------------
Format: 1.8
Date: Mon, 09 Aug 2021 16:46:29 +0200
Source: klibc
Built-For-Profiles: noudeb
Architecture: source
Version: 2.0.8-6.1ubuntu2
Distribution: impish
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Lukas Märdian <slyon at ubuntu.com>
Closes: 943425
Changes:
 klibc (2.0.8-6.1ubuntu2) impish; urgency=medium
 .
   * Merge with Debian; remaining changes:
     - Keep Ubuntu specific debian/patches/cf-protection.patch
   * Add debian/patches/armhf-min-fpu.patch for GCC-11 compatibility
 .
 klibc (2.0.8-6.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * {set,long}jmp [s390x]: save/restore the correct FPU registers
     (f8‥f15 not f1/f3/f5/f7) (Closes: #943425)
 .
 klibc (2.0.8-6) unstable; urgency=medium
 .
   * Upload to unstable
   * malloc: Set errno on failure
   * malloc: Fail if requested size > PTRDIFF_MAX (CVE-2021-31873)
   * calloc: Fail if multiplication overflows (CVE-2021-31870)
   * cpio: Fix possible integer overflow on 32-bit systems (CVE-2021-31872)
   * cpio: Fix possible crash on 64-bit systems (CVE-2021-31871)
Checksums-Sha1:
 0e4c4d25c88607fc819669eaeb140d5f8e565c04 2222 klibc_2.0.8-6.1ubuntu2.dsc
 c9ebe581aec22d9a9e325c90124331571622231a 26392 klibc_2.0.8-6.1ubuntu2.debian.tar.xz
 68595263bc72708ca75e2f34785dceb2a41fd2c1 7869 klibc_2.0.8-6.1ubuntu2_source.buildinfo
Checksums-Sha256:
 dbcdfba96d0e2ee1384d8e8cbab474e3ddae7014b6e1009633866d75b0109316 2222 klibc_2.0.8-6.1ubuntu2.dsc
 700f69e4a27f583a4bca4e30aac57b2ee68f5642cf44d79145fb22dbe3178335 26392 klibc_2.0.8-6.1ubuntu2.debian.tar.xz
 c72f56459a3ee682187f26021e154f9d44fa4884d5ff38a2f69727dd8922329b 7869 klibc_2.0.8-6.1ubuntu2_source.buildinfo
Files:
 c88f6e3e52d58031798d9a57c0a3fe9b 2222 libs optional klibc_2.0.8-6.1ubuntu2.dsc
 4fdc727ddefc9ef4858a3d054a025ea2 26392 libs optional klibc_2.0.8-6.1ubuntu2.debian.tar.xz
 68c7ef221ea2623554f30c651f187c5b 7869 libs optional klibc_2.0.8-6.1ubuntu2_source.buildinfo
Original-Maintainer: Debian Kernel Team <debian-kernel at lists.debian.org>


More information about the impish-changes mailing list