Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

glibc-2.26-75 #28622

Merged
merged 2 commits into from Nov 6, 2017
Merged

glibc-2.26-75 #28622

merged 2 commits into from Nov 6, 2017

Conversation

vcunat
Copy link
Member

@vcunat vcunat commented Aug 27, 2017

Largest expected caveat: upstream bumped the minimal supportable kernel to 3.2.0. That's the oldest kernel still supported upstream, released in Jan 2012, but most notably RHEL 6 and derivates still use a heavily patched 2.6.32 kernel and those systems are still supported and in use (production support is scheduled to last till the end of 2020!).

Therefore, I suggest to postpone this after branching 17.09, at least; it won't be nice even after that, but I fail to see a better option ATM.

@mention-bot
Copy link

@vcunat, thanks for your PR! By analyzing the history of the files in this pull request, we identified @edolstra, @peti and @Dridus to be potential reviewers.

@vcunat
Copy link
Member Author

vcunat commented Aug 27, 2017

A single coreutils test started failing :-/

test-getopt.h:754: assertion 'strcmp (argv[1], "donald") == 0' failed

It seems no use to rush merging this.

@vcunat vcunat mentioned this pull request Sep 2, 2017
8 tasks
@wizeman wizeman closed this Oct 30, 2017
@wizeman wizeman deleted the glibc-2.26 branch October 30, 2017 15:20
@grahamc grahamc restored the glibc-2.26 branch October 30, 2017 15:54
Security: the NEWS claims a couple more CVEs are fixed than what we
patched, though perhaps nothing critical.

I personally don't find DNS fragmentation attacks that interesting
anymore, as it's just about weaker improvements for cases that choose
not to use DNSSEC.

Largest expected caveat: upstream bumped the minimal supportable kernel
to 3.2.0.  That's the oldest kernel still supported upstream, released
in Jan 2012, but most notably RHEL 6 and derivates still use a heavily
patched 2.6.32 kernel and those systems are still supported and in use
(production support is scheduled to last till the end of 2020!).
@vcunat vcunat changed the title [WIP] glibc-2.26 glibc-2.26-75 Nov 5, 2017
@vcunat vcunat reopened this Nov 5, 2017
@vcunat
Copy link
Member Author

vcunat commented Nov 5, 2017

Now there are some CVE fixes in this PR. I won't keep it waiting long, just let 17.09 rebuild first with glibc patches.

@vcunat
Copy link
Member Author

vcunat commented Nov 7, 2017

Hmm, this will cause relatively lots of build-time breakages. I will try to patch some, mainly older versions of gcc and llvm, and anything blocking "important" packages, but I can't manage everything.

@vcunat
Copy link
Member Author

vcunat commented Nov 7, 2017

@7c6f434c, @asppsa: do you think that pure can be migrated to some newer llvm? So far I only bothered to fix 3.7 and newer branches...

@7c6f434c
Copy link
Member

7c6f434c commented Nov 7, 2017

Technical answer: still no, https://bitbucket.org/purelang/pure-lang/issues/36/port-pure-to-the-mcjit-in-order-to-support

@asppsa
Copy link
Contributor

asppsa commented Nov 8, 2017

@vcunat, yeah dependency on old LLVM is unfortunately an ongoing problem for Pure. My guess is that this will not be fixed any time soon.

@vcunat
Copy link
Member Author

vcunat commented Nov 8, 2017

OK. It's similar for llvm-general, though there are branches for newer LLVM versions.

@vcunat
Copy link
Member Author

vcunat commented Nov 8, 2017

I will probably fix llvm-3.5 within a week, but certainly feel free to beat me.

@vcunat
Copy link
Member Author

vcunat commented Dec 21, 2017

Support for RHEL 6 and friends: #32954

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

6 participants