From: Florian Weimer Date: Thu, 24 May 2018 12:41:57 +0000 (+0200) Subject: Add references to CVE-2018-11236, CVE-2017-18269 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=a5bc5ec96765ab7cf681449f194abf4aa5620423;p=thirdparty%2Fglibc.git Add references to CVE-2018-11236, CVE-2017-18269 --- diff --git a/ChangeLog b/ChangeLog index 41b4dae2318..e45fa8e6d00 100644 --- a/ChangeLog +++ b/ChangeLog @@ -16,6 +16,7 @@ 2018-05-09 Paul Pluzhnikov [BZ #22786] + CVE-2018-11236 * stdlib/canonicalize.c (__realpath): Fix overflow in path length computation. * stdlib/Makefile (test-bz22786): New test. @@ -59,6 +60,7 @@ Max Horn [BZ #22644] + CVE-2017-18269 * sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S: Fixed branch conditions. * string/test-memmove.c (do_test2): New testcase. diff --git a/NEWS b/NEWS index c3c6aff8fc6..27548fdb4b2 100644 --- a/NEWS +++ b/NEWS @@ -59,6 +59,9 @@ Security related changes: for AT_SECURE or SUID binaries could be used to load libraries from the current directory. + CVE-2017-18269: An SSE2-based memmove implementation for the i386 + architecture could corrupt memory. Reported by Max Horn. + CVE-2018-1000001: Buffer underflow in realpath function when getcwd function succeeds without returning an absolute path due to unexpected behaviour of the Linux kernel getcwd syscall. Reported by halfdog.