From: Florian Weimer Date: Fri, 6 Feb 2015 15:30:15 +0000 (+0100) Subject: NEWS: Also mention CVE-2015-1473 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=c66e8b9e58603e92171cd87f9ad3759304f25255;p=thirdparty%2Fglibc.git NEWS: Also mention CVE-2015-1473 --- diff --git a/NEWS b/NEWS index 617cdbb605d..4b07474326f 100644 --- a/NEWS +++ b/NEWS @@ -21,10 +21,11 @@ Version 2.21 17801, 17803, 17806, 17834, 17844, 17848, 17868, 17869, 17870, 17885, 17892. -* CVE-2015-1472 Under certain conditions wscanf can allocate too little - memory for the to-be-scanned arguments and overflow the allocated - buffer. The implementation now correctly computes the required buffer - size when using malloc. +* CVE-2015-1472 CVE-2015-1473 Under certain conditions wscanf can allocate + too little memory for the to-be-scanned arguments and overflow the + allocated buffer. The implementation now correctly computes the required + buffer size when using malloc, and switches to malloc from alloca as + intended. * A new semaphore algorithm has been implemented in generic C code for all machines. Previous custom assembly implementations of semaphore were