diff options
author | Allan McRae <allan@archlinux.org> | 2014-12-18 11:01:43 +1000 |
---|---|---|
committer | Adhemerval Zanella <azanella@linux.vnet.ibm.com> | 2015-01-16 07:53:55 -0500 |
commit | 32404a33a03747951daafde164e3b14464c28fe9 (patch) | |
tree | ac4312d3a71f99ea6ff23bc67389c735b30b8cb1 | |
parent | d2a6f3a27b791d91beec2ea91f293ec898080904 (diff) | |
download | glibc-32404a33a03747951daafde164e3b14464c28fe9.tar glibc-32404a33a03747951daafde164e3b14464c28fe9.tar.gz glibc-32404a33a03747951daafde164e3b14464c28fe9.tar.bz2 glibc-32404a33a03747951daafde164e3b14464c28fe9.zip |
Label CVE-2014-9402 in NEWS
-rw-r--r-- | NEWS | 5 |
1 files changed, 3 insertions, 2 deletions
@@ -42,8 +42,9 @@ Version 2.19.1 * CVE-2012-3406 printf-style functions could run into a stack overflow when processing format strings with a large number of format specifiers. -* The nss_dns implementation of getnetbyname could run into an infinite loop - if the DNS response contained a PTR record of an unexpected format. +* CVE-2014-9402 The nss_dns implementation of getnetbyname could run into an + infinite loop if the DNS response contained a PTR record of an unexpected + format. Version 2.19 |