Your message dated Fri, 16 Jan 2026 22:04:57 +0000 with message-id <E1vgrw9-0000000HMUb-1pGh@fasolo.debian.org> and subject line Bug#1125678: fixed in glibc 2.42-8 has caused the Debian Bug report #1125678, regarding glibc: CVE-2026-0861 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1125678: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125678 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: glibc: CVE-2026-0861
- From: Salvatore Bonaccorso <carnil@debian.org>
- Date: Thu, 15 Jan 2026 22:00:01 +0100
- Message-id: <[🔎] 176851080120.2671351.13460605640544296230.reportbug@eldamar.lan>
Source: glibc Version: 2.42-7 Severity: important Tags: security upstream Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=33796 X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org> Control: found -1 2.41-12+deb13u1 Control: found -1 2.36-9+deb12u7 Control: found -1 2.36-9+deb12u13 Hi, The following vulnerability was published for glibc. CVE-2026-0861[0]: | Passing too large an alignment to the memalign suite of functions | (memalign, posix_memalign, aligned_alloc, valloc, pvalloc) in the | GNU C Library version 2.30 to 2.42 may result in an integer | overflow, which could consequently result in a heap corruption. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-0861 https://www.cve.org/CVERecord?id=CVE-2026-0861 [1] https://sourceware.org/bugzilla/show_bug.cgi?id=33796 Regards, Salvatore
--- End Message ---
--- Begin Message ---
- To: 1125678-close@bugs.debian.org
- Subject: Bug#1125678: fixed in glibc 2.42-8
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Fri, 16 Jan 2026 22:04:57 +0000
- Message-id: <E1vgrw9-0000000HMUb-1pGh@fasolo.debian.org>
- Reply-to: Aurelien Jarno <aurel32@debian.org>
Source: glibc Source-Version: 2.42-8 Done: Aurelien Jarno <aurel32@debian.org> We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1125678@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno <aurel32@debian.org> (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 16 Jan 2026 21:50:10 +0100 Source: glibc Architecture: source Version: 2.42-8 Distribution: unstable Urgency: medium Maintainer: GNU Libc Maintainers <debian-glibc@lists.debian.org> Changed-By: Aurelien Jarno <aurel32@debian.org> Closes: 1125678 Changes: glibc (2.42-8) unstable; urgency=medium . [ Samuel Thibault ] * debian/testsuite-xfail-debian.mk: Avoid running tst-writev on hurd-amd64. * debian/patches/hurd-i386/git-sigreturn-xmm.diff: Fix sigreturn using xmm registers in the signal contention case. * debian/patches/hurd-i386/local-intr-msg-clobber.diff: Try to re-introduce mmx clobber work-around. * debian/testsuite-xfail-debian.mk: Update hurd results. . [ Aurelien Jarno ] * debian/rules.d/build.mk: do not write BUILD_CXX to configparms, it's unused. * debian/patches/git-updates.diff: update from upstream stable branch: - Fix and integer overflow in _int_memalign leading to heap corruption (CVE-2026-0861). Closes: #1125678. - Fix stack contents leak in getnetbyaddr (CVE-2026-0915). - Optimize trylock for high cache contention workloads. . [ Helmut Grohne ] * debian/control.in/main: avoid g++ dependency in nocheck builds. * debian/control.in/main, rules, rules.d/build.mk: don't build nscd in stage2. Checksums-Sha1: 8f7059ddb744357eb7671be2b541d65f1b12b9dc 8848 glibc_2.42-8.dsc b882678221ac26e92170472d21ed396a5744ab6c 418452 glibc_2.42-8.debian.tar.xz 447346c805da86f60cee210d19b1e0c75a490039 9465 glibc_2.42-8_source.buildinfo Checksums-Sha256: aa5f310704d337b43846ab0423905a16c16c4a0cc31e17a7e98a397db62c28b7 8848 glibc_2.42-8.dsc 49bd2a728a74b308843e470f21b9cfcdc3219e6d2ffd81b0f5ba7290ab1ef316 418452 glibc_2.42-8.debian.tar.xz 6574e75d2f0084ae818b4d9a2fa91b29dc95aa17e3978bb6b9bb170475362c3b 9465 glibc_2.42-8_source.buildinfo Files: b7ac9cc8039f4d0e80c352b93ac13297 8848 libs required glibc_2.42-8.dsc e7eb01f4bc1664dd1b66fa5ff1d04ceb 418452 libs required glibc_2.42-8.debian.tar.xz d410a863d10847a99050fe439464a280 9465 libs required glibc_2.42-8_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEUryGlb40+QrX1Ay4E4jA+JnoM2sFAmlqpT8ACgkQE4jA+Jno M2vB4g/8C0twLBQsTmP0+I0PouAO4CUkpIQ9NqAspV/NwEB0V+TMlrPBAnCjLXjm G5bp76qn8Sd0REPrgATfWnGYgz0xlIJmtrXD1bilWIfZkp8xJhFEwpYafKz4QT1Z WSEQUVPwlef1XFwGkdChSuYEdgqFp7nFFRwJ1GNDrFe51Q3FavMIaXTMXERf2lnG UAMNdKoSlV2rLxvj8M6f1hKM8irkR++KXZVG2S4u3a1RNLpCyj/2zwi8NHfx6afH UiysdxqrW15xLgfx8OBgocyOCQGBx0S0vLKK59YVopUFrNsYV+FoKisfkBeJpvoH oIgnGDLN0xKuuLIhtuHT15JFQRPfXfCO0n6C75FgyWA1vJn28RjJaf5SBUqVthI0 Qda8LaOtQuypgUGhhLi8TjW26Q6V2qbsj2il5AbaY2XV0FZTswsX+vGHIfCZifBU /XX3zyYF11bGxmkTtoJNyr7gGbAxFSB70rC5hUEdNVy/FAH8B8tWWIlIzQqUBUFx DFUO51mlpdUTKPkC6rebYKxYPlohTiuE2eXde9mdlAcdvuh8n7xTqds0TLkbVP9n l6swa9Qejs4RX9UUZulowESoxypHA4I2Mm4NA9cpTa6dHh8cute+TAYvVCXK7CGD 2UiA7FtupvCjmNZyr/AGBWwtxXgg1SpctMuTzKIlYu2oUOnR7Ao= =UB5M -----END PGP SIGNATURE-----Attachment: pgp4U7kVu04vk.pgp
Description: PGP signature
--- End Message ---