From: Florian Weimer Date: Thu, 24 May 2018 10:19:11 +0000 (+0200) Subject: Add references to CVE-2017-18269, CVE-2018-11236, CVE-2018-11237 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=659b3df5db97948f4c6042203163873fb96ec512;p=thirdparty%2Fglibc.git Add references to CVE-2017-18269, CVE-2018-11236, CVE-2018-11237 (cherry picked from commit 43d4f3d5ad94e1fa5e56d7a7200d0e9f3d8e2f02) --- diff --git a/ChangeLog b/ChangeLog index f650db1d59a..988615f03b5 100644 --- a/ChangeLog +++ b/ChangeLog @@ -10,6 +10,7 @@ 2018-05-09 Paul Pluzhnikov [BZ #22786] + CVE-2018-11236 * stdlib/canonicalize.c (__realpath): Fix overflow in path length computation. * stdlib/Makefile (test-bz22786): New test. @@ -19,6 +20,7 @@ Max Horn [BZ #22644] + CVE-2017-18269 * sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S: Fixed branch conditions. * string/test-memmove.c (do_test2): New testcase. diff --git a/NEWS b/NEWS index 7e1859b78ef..13ac8dd9116 100644 --- a/NEWS +++ b/NEWS @@ -49,6 +49,17 @@ Security related changes: for AT_SECURE or SUID binaries could be used to load libraries from the current directory. + CVE-2017-18269: An SSE2-based memmove implementation for the i386 + architecture could corrupt memory. Reported by Max Horn. + + CVE-2018-11236: Very long pathname arguments to realpath function could + result in an integer overflow and buffer overflow. Reported by Alexey + Izbyshev. + + CVE-2018-11237: The mempcpy implementation for the Intel Xeon Phi + architecture could write beyond the target buffer, resulting in a buffer + overflow. Reported by Andreas Schwab. + The following bugs are resolved with this release: [20790] Fix rpcgen buffer overrun