diff options
author | Florian Weimer <fweimer@redhat.com> | 2018-02-06 09:19:03 +0100 |
---|---|---|
committer | Florian Weimer <fweimer@redhat.com> | 2018-02-06 09:19:13 +0100 |
commit | 71aa429b029fdb6f9e65d44050388b51eca460d6 (patch) | |
tree | d74fef81ec7f455c0d695a6f56ac2e685bae4bc1 | |
parent | 26c07172cde74617ca7214c93cdcfa75321e6b2b (diff) | |
download | glibc-71aa429b029fdb6f9e65d44050388b51eca460d6.tar glibc-71aa429b029fdb6f9e65d44050388b51eca460d6.tar.gz glibc-71aa429b029fdb6f9e65d44050388b51eca460d6.tar.bz2 glibc-71aa429b029fdb6f9e65d44050388b51eca460d6.zip |
Record CVE-2018-6551 in NEWS and ChangeLog [BZ #22774]
-rw-r--r-- | ChangeLog | 2 | ||||
-rw-r--r-- | NEWS | 4 |
2 files changed, 6 insertions, 0 deletions
@@ -999,7 +999,9 @@ 2018-01-18 Arjun Shankar <arjun@redhat.com> [BZ #22343] + [BZ #22774] CVE-2018-6485 + CVE-2018-6551 * malloc/malloc.c (checked_request2size): call REQUEST_OUT_OF_RANGE after padding. (_int_memalign): check for integer overflow before calling @@ -291,6 +291,10 @@ Security related changes: an object size near the value of SIZE_MAX, would return a pointer to a buffer which is too small, instead of NULL. Reported by Jakub Wilk. + CVE-2018-6551: The malloc function, when called with an object size near + the value of SIZE_MAX, would return a pointer to a buffer which is too + small, instead of NULL. + The following bugs are resolved with this release: [866] glob: glob should match dangling symlinks |