From: Hemanth Kumar M D <Hemanth.KumarMD@windriver.com>
To: openembedded-core@lists.openembedded.org
Cc: Sundeep.Kokkonda@windriver.com
Subject: Re: [whinlatter][PATCH] glibc: stable 2.42 branch updates
Date: Fri, 10 Apr 2026 17:58:07 +0530 [thread overview]
Message-ID: <c0d953d8-7f12-4056-bd97-e4e908d4e12d@windriver.com> (raw)
In-Reply-To: <20260410120908.2669458-1-Hemanth.KumarMD@windriver.com>
[-- Attachment #1: Type: text/plain, Size: 4406 bytes --]
Hello,
This patch depends on the related whinlatter backport series addressing
build issues with newer glibc:
https://lists.openembedded.org/g/openembedded-core/message/235011?p=%2C%2C%2C20%2C0%2C0%2C0%3A%3ACreated%2C%2C%5Bwhinlatter%5D%5BPATCH+1%2F9%5D+dtc%3A+backport+fix+for+build+with+glibc-2.43%2C20%2C2%2C0%2C118744346
<https://lists.openembedded.org/g/openembedded-core/message/235011?p=%2C%2C%2C20%2C0%2C0%2C0%3A%3ACreated%2C%2C%5Bwhinlatter%5D%5BPATCH+1%2F9%5D+dtc%3A+backport+fix+for+build+with+glibc-2.43%2C20%2C2%2C0%2C118744346>
On 10-04-2026 05:39 pm, Hemanth.KumarMD@windriver.com wrote:
> From: Hemanth Kumar M D<Hemanth.KumarMD@windriver.com>
>
> $ git log --oneline 912d89a766847649a3857985a3b5e6065c51bfd4..a56a2943d2ce541102c630142c2eae0fbfc5886b
>
> a56a2943d2 tests: fix tst-rseq with Linux 7.0
> 68099ccc94 elf: parse /proc/self/maps as the last resort to find the gap for tst-link-map-contiguous-ldso
> 426378547e resolv: Check hostname for validity (CVE-2026-4438)
> 8e863fb1c9 resolv: Count records correctly (CVE-2026-4437)
> 1a19d5a507 posix: Run tst-wordexp-reuse-mem test
> 9cd9c90544 iconvdata: Fix invalid pointer arithmetic in ANSI_X3.110 module
> ebd45473f5 nss: Missing checks in __nss_configure_lookup, __nss_database_get (bug 28940)
> 937ef7aaf3 Linux: In getlogin_r, use utmp fallback only for specific errors
> 3989780591 nss: Introduce dedicated struct nss_database_for_fork type
>
> Testing Results:
> +--------------+--------+--------+------+
> | Result | Before | After | Diff |
> +--------------+--------+--------+------+
> | PASS | 6934 | 6938 | +4 |
> | XPASS | 4 | 4 | 0 |
> | FAIL | 76 | 75 | -1 |
> | XFAIL | 16 | 16 | 0 |
> | UNSUPPORTED | 108 | 109 | +1 |
> +--------------+--------+--------+------+
>
> Changes in testcases:
> +------------------------------------------------------+--------+-------------+
> | Testcase | Before | After |
> +------------------------------------------------------+--------+-------------+
> | elf/tst-glibc-hwcaps | FAIL | PASS |
> | elf/tst-ldconfig-soname | FAIL | PASS |
> | nptl/tst-thread-affinity-pthread2 | PASS | FAIL |
> | nss/tst-nss-malloc-failure-getlogin_r | N/A | UNSUPPORTED |
> | posix/tst-wordexp-reuse-mem | N/A | PASS |
> | resolv/tst-resolv-dns-section | N/A | PASS |
> | resolv/tst-resolv-invalid-ptr | N/A | PASS |
> +------------------------------------------------------+--------+-------------+
>
> Signed-off-by: Hemanth Kumar M D<Hemanth.KumarMD@windriver.com>
> ---
> meta/recipes-core/glibc/glibc-version.inc | 2 +-
> meta/recipes-core/glibc/glibc_2.42.bb | 2 +-
> 2 files changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc
> index 9991c02495..9f1003570d 100644
> --- a/meta/recipes-core/glibc/glibc-version.inc
> +++ b/meta/recipes-core/glibc/glibc-version.inc
> @@ -1,6 +1,6 @@
> SRCBRANCH ?= "release/2.42/master"
> PV = "2.42+git"
> -SRCREV_glibc ?= "912d89a766847649a3857985a3b5e6065c51bfd4"
> +SRCREV_glibc ?= "a56a2943d2ce541102c630142c2eae0fbfc5886b"
> SRCREV_localedef ?= "cba02c503d7c853a38ccfb83c57e343ca5ecd7e5"
>
> GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https" diff --git a/meta/recipes-core/glibc/glibc_2.42.bb
> b/meta/recipes-core/glibc/glibc_2.42.bb index a8717c0eae..7e0aa3d5fc
> 100644 --- a/meta/recipes-core/glibc/glibc_2.42.bb +++
> b/meta/recipes-core/glibc/glibc_2.42.bb @@ -17,7 +17,7 @@ Allows for
> ASLR bypass so can bypass some hardening, not an exploit in itself, m
> easier access for another. 'ASLR bypass itself is not a vulnerability.'"
>
> CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS"
> -CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915"
> +CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915 CVE-2026-4437 CVE-2026-4438"
> CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix available in used git hash"
>
> DEPENDS += "gperf-native bison-native"
--
Regards,
Hemanth Kumar M D
[-- Attachment #2: Type: text/html, Size: 5584 bytes --]
prev parent reply other threads:[~2026-04-10 12:28 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-10 12:09 [whinlatter][PATCH] glibc: stable 2.42 branch updates Hemanth.KumarMD
2026-04-10 12:28 ` Hemanth Kumar M D [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=c0d953d8-7f12-4056-bd97-e4e908d4e12d@windriver.com \
--to=hemanth.kumarmd@windriver.com \
--cc=Sundeep.Kokkonda@windriver.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox