UbuntuUpdates.org

Package "libc6-dev-i386"

Name: libc6-dev-i386

Description:

GNU C Library: 32-bit development libraries for AMD64

Latest version: 2.39-0ubuntu8.7
Release: noble (24.04)
Level: updates
Repository: main
Head package: glibc
Homepage: https://www.gnu.org/software/libc/libc.html

Links


Download "libc6-dev-i386"


Other versions of "libc6-dev-i386" in Noble

Repository Area Version
base main 2.39-0ubuntu8
security main 2.39-0ubuntu8.7

Changelog

Version: 2.39-0ubuntu8.7 2026-02-03 11:07:58 UTC

  glibc (2.39-0ubuntu8.7) noble-security; urgency=medium

  * SECURITY UPDATE: use-after-free in wordexp_t fields
    - debian/patches/CVE-2025-15281.patch: posix: Reset wordexp_t fields
      with WRDE_REUSE
    - CVE-2025-15281
  * SECURITY UPDATE: integer overflow in memalign
    - debian/patches/CVE-2026-0861.patch: memalign: reinstate alignment
      overflow check
    - CVE-2026-0861
  * SECURITY UPDATE: memory leak in NSS DNS
    - debian/patches/CVE-2026-0915.patch: resolv: Fix NSS DNS backend for
      getnetbyaddr
    - CVE-2026-0915

 -- Nishit Majithia <email address hidden> Fri, 30 Jan 2026 13:57:54 +0530

Source diff to previous version
CVE-2025-15281 Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return un
CVE-2026-0861 Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42
CVE-2026-0915 Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-v

Version: 2.39-0ubuntu8.6 2025-09-22 22:07:59 UTC

  glibc (2.39-0ubuntu8.6) noble-security; urgency=medium

  * SECURITY UPDATE: double-free in regcomp function
    - debian/patches/any/CVE-2025-8058.patch: fix double-free after
      allocation failure in regcomp in posix/Makefile, posix/regcomp.c,
      posix/tst-regcomp-bracket-free.c.
    - CVE-2025-8058

 -- Marc Deslauriers <email address hidden> Wed, 17 Sep 2025 10:55:42 -0400

Source diff to previous version
CVE-2025-8058 The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accompl

Version: 2.39-0ubuntu8.5 2025-07-14 23:09:40 UTC

  glibc (2.39-0ubuntu8.5) noble-security; urgency=medium

  * SECURITY UPDATE: insecure power10 strcmp implementation
    - debian/patches/any/CVE-2025-5702.patch: remove power10 optimized
      strcmp.
    - CVE-2025-5702
  * Moved other security patches to debian/patches/any.

 -- Marc Deslauriers <email address hidden> Wed, 09 Jul 2025 12:47:47 -0400

Source diff to previous version
CVE-2025-5702 The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 witho

Version: 2.39-0ubuntu8.4 2025-02-06 19:07:21 UTC

  glibc (2.39-0ubuntu8.4) noble-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow in the assert function.
    - debian/patches/any/CVE-2025-0395.patch: Change total to ALIGN_UP
      calculation and include libc-pointer-arith.h in assert/assert.c and
      sysdeps/posix/libc_fatal.c.
    - CVE-2025-0395

 -- Hlib Korzhynskyy <email address hidden> Tue, 28 Jan 2025 13:37:37 -0330

Source diff to previous version
CVE-2025-0395 When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message stri

Version: 2.39-0ubuntu8.3 2024-08-21 18:07:07 UTC

  glibc (2.39-0ubuntu8.3) noble; urgency=medium

  * Fix framepointer flags for s390x and ppc64el
    (LP: #2064538, LP: #2064539)

 -- Simon Chopin <email address hidden> Thu, 08 Aug 2024 16:47:42 +0200




About   -   Send Feedback to @ubuntu_updates