aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAllan McRae <allan@archlinux.org>2014-12-18 11:01:43 +1000
committerAdhemerval Zanella <azanella@linux.vnet.ibm.com>2015-01-16 07:53:55 -0500
commit32404a33a03747951daafde164e3b14464c28fe9 (patch)
treeac4312d3a71f99ea6ff23bc67389c735b30b8cb1
parentd2a6f3a27b791d91beec2ea91f293ec898080904 (diff)
downloadglibc-32404a33a03747951daafde164e3b14464c28fe9.tar
glibc-32404a33a03747951daafde164e3b14464c28fe9.tar.gz
glibc-32404a33a03747951daafde164e3b14464c28fe9.tar.bz2
glibc-32404a33a03747951daafde164e3b14464c28fe9.zip
Label CVE-2014-9402 in NEWS
-rw-r--r--NEWS5
1 files changed, 3 insertions, 2 deletions
diff --git a/NEWS b/NEWS
index c96992473b..b4ed743082 100644
--- a/NEWS
+++ b/NEWS
@@ -42,8 +42,9 @@ Version 2.19.1
* CVE-2012-3406 printf-style functions could run into a stack overflow when
processing format strings with a large number of format specifiers.
-* The nss_dns implementation of getnetbyname could run into an infinite loop
- if the DNS response contained a PTR record of an unexpected format.
+* CVE-2014-9402 The nss_dns implementation of getnetbyname could run into an
+ infinite loop if the DNS response contained a PTR record of an unexpected
+ format.
Version 2.19