-
Task
-
Resolution: Unresolved
-
Major
-
None
-
1
-
rhel-pt-c-libs
-
PT C Libraries Refinement
-
3
-
False
-
-
None
Backport the following commits to all relevant upstream branches for RHEL 10 (2.39 and later).
This allows us to use another 2.39 sync to fix these issues.
commit 324084649b2da2f6840e3a1b84159a4e9a9e9a74
Author: DJ Delorie <dj@redhat.com>
Date: Wed Oct 15 21:37:56 2025 -0400
sprof: check pread size and offset for overflow
Add a bit of descriptive paranoia to the values we read from
the ELF headers and use to access data.
Reviewed-by: Collin Funk <collin.funk1@gmail.com>
commit 33aeb88c5bc9a0c6b1bd7190a0ead7570972b719
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Tue Dec 17 15:18:36 2024 +0800
getaddrinfo.c: Avoid uninitialized pointer access [BZ #32465]
Add valid_decimal_value to check valid decimal value in a string to
avoid uninitialized endp in add_prefixlist and gaiconf_init as reported
by Clang 19:
./getaddrinfo.c:1884:11: error: variable 'endp' is used uninitialized whenever '||' condition is true [-Werror,-Wsometimes-uninitialized]
1884 | && (cp == NULL
| ^~~~~~~~~~
./getaddrinfo.c:1887:11: note: uninitialized use occurs here
1887 | && *endp == '\0'
| ^~~~
./getaddrinfo.c:1884:11: note: remove the '||' if its condition is always false
1884 | && (cp == NULL
| ^~~~~~~~~~
1885 | || (bits = strtoul (cp, &endp, 10)) != ULONG_MAX
| ~~
./getaddrinfo.c:1875:13: note: initialize the variable 'endp' to silence this warning
1875 | char *endp;
| ^
| = NULL
This fixes BZ #32465.
Signed-off-by: H.J. Lu <hjl.tools@gmail.com>
Reviewed-by: Sam James <sam@gentoo.org>
commit 20a2a756089eacd7e7f4c02e381e82b5d0e40a2c
Author: Florian Weimer <fweimer@redhat.com>
Date: Thu Nov 6 14:33:22 2025 +0100
support: Fix FILE * leak in check_for_unshare_hints in test-container
The file opened via fopen is never closed.
commit b64335ff111c071fde61aec1c1a8460afb3d16d4
Author: Florian Weimer <fweimer@redhat.com>
Date: Thu Nov 6 14:49:21 2025 +0100
support: Exit on consistency check failure in resolv_response_add_name
Using TEST_VERIFY (crname_target != crname) instructs some analysis
tools that crname_target == crname might hold. Under this assumption,
they report a use-after-free for crname_target->offset below, caused
by the previous free (crname).
Reviewed-by: Collin Funk <collin.funk1@gmail.com>
Acceptance Criteria
- The identified commits are part of the glibc 2.39 upstream branch (as backports).
- Later branches (2.40 etc.) have the same change, either due to regular development or backports.
- blocks
-
RHEL-126766 glibc: Import bug fixes: 2.39 → c10s (snapshot 8)
-
- Planning
-