From: Florian Weimer Date: Thu, 1 Feb 2018 14:00:44 +0000 (+0100) Subject: Record CVE-2018-6485 in ChangeLog and NEWS [BZ #22343] X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=436359fd41343c1db0616bd90e8a05bf188f237c;p=thirdparty%2Fglibc.git Record CVE-2018-6485 in ChangeLog and NEWS [BZ #22343] (cherry picked from commit 4590634fd65162568b9f52fb4beb60aa25da37f2) --- diff --git a/ChangeLog b/ChangeLog index a01b406e426..e92c1106024 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,6 +1,7 @@ 2018-01-18 Arjun Shankar [BZ #22343] + CVE-2018-6485 * malloc/malloc.c (checked_request2size): call REQUEST_OUT_OF_RANGE after padding. (_int_memalign): check for integer overflow before calling diff --git a/NEWS b/NEWS index d7c016c021e..ac8901e05da 100644 --- a/NEWS +++ b/NEWS @@ -87,6 +87,10 @@ Version 2.22.1 dynamic linker. (The glibc project disputes that this is a security vulnerability; only trusted binaries must be examined using the ldd script.) + +* CVE-2018-6485: The posix_memalign and memalign functions, when called with + an object size near the value of SIZE_MAX, would return a pointer to a + buffer which is too small, instead of NULL. Reported by Jakub Wilk. Version 2.22