aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFlorian Weimer <fweimer@redhat.com>2018-02-06 09:19:03 +0100
committerFlorian Weimer <fweimer@redhat.com>2018-02-06 09:19:13 +0100
commit71aa429b029fdb6f9e65d44050388b51eca460d6 (patch)
treed74fef81ec7f455c0d695a6f56ac2e685bae4bc1
parent26c07172cde74617ca7214c93cdcfa75321e6b2b (diff)
downloadglibc-71aa429b029fdb6f9e65d44050388b51eca460d6.tar
glibc-71aa429b029fdb6f9e65d44050388b51eca460d6.tar.gz
glibc-71aa429b029fdb6f9e65d44050388b51eca460d6.tar.bz2
glibc-71aa429b029fdb6f9e65d44050388b51eca460d6.zip
Record CVE-2018-6551 in NEWS and ChangeLog [BZ #22774]
-rw-r--r--ChangeLog2
-rw-r--r--NEWS4
2 files changed, 6 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index ca221a4ebe..e6e29b1e11 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -999,7 +999,9 @@
2018-01-18 Arjun Shankar <arjun@redhat.com>
[BZ #22343]
+ [BZ #22774]
CVE-2018-6485
+ CVE-2018-6551
* malloc/malloc.c (checked_request2size): call REQUEST_OUT_OF_RANGE
after padding.
(_int_memalign): check for integer overflow before calling
diff --git a/NEWS b/NEWS
index 06ae43d3f0..3629944946 100644
--- a/NEWS
+++ b/NEWS
@@ -291,6 +291,10 @@ Security related changes:
an object size near the value of SIZE_MAX, would return a pointer to a
buffer which is too small, instead of NULL. Reported by Jakub Wilk.
+ CVE-2018-6551: The malloc function, when called with an object size near
+ the value of SIZE_MAX, would return a pointer to a buffer which is too
+ small, instead of NULL.
+
The following bugs are resolved with this release:
[866] glob: glob should match dangling symlinks