]> git.ipfire.org Git - thirdparty/glibc.git/commitdiff
Record CVE-2018-6485 in ChangeLog and NEWS [BZ #22343]
authorFlorian Weimer <fweimer@redhat.com>
Thu, 1 Feb 2018 14:00:44 +0000 (15:00 +0100)
committerTulio Magno Quites Machado Filho <tuliom@linux.ibm.com>
Fri, 6 Apr 2018 19:27:42 +0000 (16:27 -0300)
(cherry picked from commit 4590634fd65162568b9f52fb4beb60aa25da37f2)

ChangeLog
NEWS

index a01b406e42614c4223f42b65be7822d834f7984d..e92c11060240964b0205329a921ed0b0ecabbf89 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,6 +1,7 @@
 2018-01-18  Arjun Shankar  <arjun@redhat.com>
 
        [BZ #22343]
+       CVE-2018-6485
        * malloc/malloc.c (checked_request2size): call REQUEST_OUT_OF_RANGE
        after padding.
        (_int_memalign): check for integer overflow before calling
diff --git a/NEWS b/NEWS
index d7c016c021e6d77d6ebe8843eef5e8df048cef1f..ac8901e05da176fb4880c3da5518509518007700 100644 (file)
--- a/NEWS
+++ b/NEWS
@@ -87,6 +87,10 @@ Version 2.22.1
   dynamic linker.  (The glibc project disputes that this is a security
   vulnerability; only trusted binaries must be examined using the ldd
   script.)
+
+* CVE-2018-6485: The posix_memalign and memalign functions, when called with
+  an object size near the value of SIZE_MAX, would return a pointer to a
+  buffer which is too small, instead of NULL.  Reported by Jakub Wilk.
 \f
 Version 2.22