Package "glibc"

Name: glibc


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • GNU C Library: Documentation
  • GNU C Library: Binaries
  • GNU C Library: Development binaries
  • GNU C Library: Shared libraries

Latest version: 2.30-0ubuntu2.2
Release: eoan (19.10)
Level: updates
Repository: main


Other versions of "glibc" in Eoan

Repository Area Version
base universe 2.30-0ubuntu2
base main 2.30-0ubuntu2
security main 2.30-0ubuntu2.2
security universe 2.30-0ubuntu2.2
updates universe 2.30-0ubuntu2.2

Packages in group

Deleted packages are displayed in grey.


Version: 2.30-0ubuntu2.2 2020-07-06 20:06:35 UTC

  glibc (2.30-0ubuntu2.2) eoan-security; urgency=medium

    - debian/patches/any/CVE-2019-19126.patch: check __libc_enable_secure
      before honoring LD_PREFER_MAP_32BIT_EXEC in
    - CVE-2019-19126
  * SECURITY UPDATE: out-of-bounds write on PowerPC
    - debian/patches/any/CVE-2020-1751.patch: fix array overflow in
      backtrace on PowerPC in debug/tst-backtrace5.c,
    - CVE-2020-1751
  * SECURITY UPDATE: use-after-free via tilde expansion
    - debian/patches/any/CVE-2020-1752.patch: fix use-after-free in glob
      when expanding ~user in posix/glob.c.
    - CVE-2020-1752
  * SECURITY UPDATE: stack overflow via 80-bit long double function
    - debian/patches/any/CVE-2020-10029-1.patch: avoid ldbl-96 stack
      corruption from range reduction of pseudo-zero in
    - debian/patches/any/CVE-2020-10029-2.patch: use stack protector only
      if available in sysdeps/ieee754/ldbl-96/Makefile.
    - CVE-2020-10029

 -- Marc Deslauriers <email address hidden> Thu, 04 Jun 2020 13:19:08 -0400

Source diff to previous version
CVE-2019-19126 On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during progra
CVE-2020-1751 An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function
CVE-2020-1752 A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths co
CVE-2020-10029 The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double func

Version: 2.30-0ubuntu2.1 2020-02-28 00:07:15 UTC

  glibc (2.30-0ubuntu2.1) eoan; urgency=medium

  * Cherrypick upstream fix for strstr on s390x z15. LP: #1854326

 -- Dimitri John Ledkov <email address hidden> Fri, 29 Nov 2019 14:19:57 +0000

1854326 [UBUNTU] - glibc: z15 (s390x) strstr implementation can return incorrect result if search string cross page boundary

About   -   Send Feedback to @ubuntu_updates