UbuntuUpdates.org

Package "libc6-dev-i386"

Name: libc6-dev-i386

Description:

GNU C Library: 32-bit development libraries for AMD64

Latest version: 2.39-0ubuntu8.6
Release: noble (24.04)
Level: security
Repository: main
Head package: glibc
Homepage: https://www.gnu.org/software/libc/libc.html

Links


Download "libc6-dev-i386"


Other versions of "libc6-dev-i386" in Noble

Repository Area Version
base main 2.39-0ubuntu8
updates main 2.39-0ubuntu8.6

Changelog

Version: 2.39-0ubuntu8.6 2025-09-22 19:07:02 UTC

  glibc (2.39-0ubuntu8.6) noble-security; urgency=medium

  * SECURITY UPDATE: double-free in regcomp function
    - debian/patches/any/CVE-2025-8058.patch: fix double-free after
      allocation failure in regcomp in posix/Makefile, posix/regcomp.c,
      posix/tst-regcomp-bracket-free.c.
    - CVE-2025-8058

 -- Marc Deslauriers <email address hidden> Wed, 17 Sep 2025 10:55:42 -0400

Source diff to previous version
CVE-2025-8058 The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accompl

Version: 2.39-0ubuntu8.5 2025-07-14 23:09:39 UTC

  glibc (2.39-0ubuntu8.5) noble-security; urgency=medium

  * SECURITY UPDATE: insecure power10 strcmp implementation
    - debian/patches/any/CVE-2025-5702.patch: remove power10 optimized
      strcmp.
    - CVE-2025-5702
  * Moved other security patches to debian/patches/any.

 -- Marc Deslauriers <email address hidden> Wed, 09 Jul 2025 12:47:47 -0400

Source diff to previous version
CVE-2025-5702 The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 witho

Version: 2.39-0ubuntu8.4 2025-02-06 16:06:55 UTC

  glibc (2.39-0ubuntu8.4) noble-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow in the assert function.
    - debian/patches/any/CVE-2025-0395.patch: Change total to ALIGN_UP
      calculation and include libc-pointer-arith.h in assert/assert.c and
      sysdeps/posix/libc_fatal.c.
    - CVE-2025-0395

 -- Hlib Korzhynskyy <email address hidden> Tue, 28 Jan 2025 13:37:37 -0330

Source diff to previous version
CVE-2025-0395 When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message stri

Version: 2.39-0ubuntu8.3 2024-08-22 17:07:19 UTC

  glibc (2.39-0ubuntu8.3) noble; urgency=medium

  * Fix framepointer flags for s390x and ppc64el
    (LP: #2064538, LP: #2064539)

 -- Simon Chopin <email address hidden> Thu, 08 Aug 2024 16:47:42 +0200

Source diff to previous version

Version: 2.39-0ubuntu8.2 2024-05-29 18:08:27 UTC

  glibc (2.39-0ubuntu8.2) noble-security; urgency=medium

  * SECURITY UPDATE: Stack-based buffer overflow
    - debian/patches/CVE-2024-33599.patch: CVE-2024-33599: nscd: Stack-
      based buffer overflow in netgroup cache.
    - CVE-2024-33599
  * SECURITY UPDATE: Null pointer
    - debian/patches/CVE-2024-33600_1.patch: CVE-2024-33600: nscd: Avoid
      null pointer crashes after notfound response.
    - debian/patches/CVE-2024-33600_2.patch: CVE-2024-33600: nscd: Do
      not send missing not-found response in addgetnetgrentX.
    - CVE-2024-33600
  * SECURITY UPDATE: Memory corruption
    - debian/patches/CVE-2024-33601_33602.patch: CVE-2024-33601, CVE-
      2024-33602: nscd: netgroup: Use two buffers in addgetnetgrentX.
    - CVE-2024-33601
    - CVE-2024-33602

 -- Paulo Flabiano Smorigo <email address hidden> Tue, 30 Apr 2024 15:02:13 -0300

CVE-2024-33599 nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then
CVE-2024-33600 nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the
CVE-2024-33601 nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xreallo
CVE-2024-33602 nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the N



About   -   Send Feedback to @ubuntu_updates