From: Aurelien Jarno Date: Sat, 16 Mar 2019 21:59:56 +0000 (+0100) Subject: Record CVE-2019-9169 in NEWS and ChangeLog [BZ #24114] X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=54e725e39d0190227b9bf975a7c3f80e8a81365a;p=thirdparty%2Fglibc.git Record CVE-2019-9169 in NEWS and ChangeLog [BZ #24114] (cherry picked from commit b626c5aa5d0673a9caa48fb79fba8bda237e6fa8) --- diff --git a/ChangeLog b/ChangeLog index 0ef60fa5ac5..5667d9262bc 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,5 +1,6 @@ 2019-01-31 Paul Eggert + CVE-2019-9169 regex: fix read overrun [BZ #24114] Problem found by AddressSanitizer, reported by Hongxu Chen in: https://debbugs.gnu.org/34140 diff --git a/NEWS b/NEWS index 11d9af739c3..f4981a16f08 100644 --- a/NEWS +++ b/NEWS @@ -76,6 +76,10 @@ Security related changes: CVE-2016-10739: The getaddrinfo function could successfully parse IPv4 addresses with arbitrary trailing characters, potentially leading to data or command injection issues in applications. + + CVE-2019-9169: Attempted case-insensitive regular-expression match + via proceed_next_node in posix/regexec.c leads to heap-based buffer + over-read. Reported by Hongxu Chen. Version 2.28