]> git.ipfire.org Git - thirdparty/glibc.git/commitdiff
Record CVE-2018-6551 in NEWS and ChangeLog [BZ #22774]
authorFlorian Weimer <fweimer@redhat.com>
Tue, 6 Feb 2018 08:19:03 +0000 (09:19 +0100)
committerFlorian Weimer <fweimer@redhat.com>
Tue, 6 Feb 2018 08:21:00 +0000 (09:21 +0100)
(cherry picked from commit 71aa429b029fdb6f9e65d44050388b51eca460d6)

ChangeLog
NEWS

index f3fe2716b2847c85e524a644897e2cbe438d7fe0..76e2767086e2c2111c4fe71bab531b657daaa538 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
 2018-01-18  Arjun Shankar  <arjun@redhat.com>
 
        [BZ #22343]
+       [BZ #22774]
        CVE-2018-6485
+       CVE-2018-6551
        * malloc/malloc.c (checked_request2size): call REQUEST_OUT_OF_RANGE
        after padding.
        (_int_memalign): check for integer overflow before calling
diff --git a/NEWS b/NEWS
index a71c1038a86aa484b52c46400e8521df58e784db..0f7b0d5a9af6d842b6fde23386cf2f2dff0fdb70 100644 (file)
--- a/NEWS
+++ b/NEWS
@@ -262,6 +262,10 @@ Security related changes:
   an object size near the value of SIZE_MAX, would return a pointer to a
   buffer which is too small, instead of NULL.  Reported by Jakub Wilk.
 
+  CVE-2018-6551: The malloc function, when called with an object size near
+  the value of SIZE_MAX, would return a pointer to a buffer which is too
+  small, instead of NULL.
+
 The following bugs are resolved with this release:
 
   [866] glob: glob should match dangling symlinks