From: Florian Weimer Date: Thu, 24 May 2018 13:50:29 +0000 (+0200) Subject: NEWS: Move security-lated changes before bug list X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=121dc10a6d58a3488aa03233a8c3c9db067525aa;p=thirdparty%2Fglibc.git NEWS: Move security-lated changes before bug list This matches the practice for previous releases. --- diff --git a/NEWS b/NEWS index 28535db4de1..2c58d073a39 100644 --- a/NEWS +++ b/NEWS @@ -13,6 +13,19 @@ Major new features: Czech languages. The Catalan and Greek languages now support abbreviated alternative month names. +Security related changes: + + CVE-2017-18269: An SSE2-based memmove implementation for the i386 + architecture could corrupt memory. Reported by Max Horn. + + CVE-2018-11236: Very long pathname arguments to realpath function could + result in an integer overflow and buffer overflow. Reported by Alexey + Izbyshev. + + CVE-2018-11237: The mempcpy implementation for the Intel Xeon Phi + architecture could write beyond the target buffer, resulting in a buffer + overflow. Reported by Andreas Schwab. + The following bugs are resolved with this release: [6889] 'PWD' mentioned but not specified @@ -50,19 +63,6 @@ The following bugs are resolved with this release: [23166] sunrpc: Remove stray exports without --enable-obsolete-rpc [23196] __mempcpy_avx512_no_vzeroupper mishandles large copies -Security related changes: - - CVE-2017-18269: An SSE2-based memmove implementation for the i386 - architecture could corrupt memory. Reported by Max Horn. - - CVE-2018-11236: Very long pathname arguments to realpath function could - result in an integer overflow and buffer overflow. Reported by Alexey - Izbyshev. - - CVE-2018-11237: The mempcpy implementation for the Intel Xeon Phi - architecture could write beyond the target buffer, resulting in a buffer - overflow. Reported by Andreas Schwab. - Version 2.27