From: Carlos O'Donell Date: Mon, 6 Feb 2023 15:36:32 +0000 (-0500) Subject: NEWS: Document CVE-2023-25139. X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=6fe86ecd787a2624cd638131629ba9a824040308;p=thirdparty%2Fglibc.git NEWS: Document CVE-2023-25139. Reviewed-by: Siddhesh Poyarekar (cherry picked from commit 67c37737ed474d25fd4dc535dfd822c426e6b971) --- diff --git a/NEWS b/NEWS index 4da140db31e..7ba8846fcca 100644 --- a/NEWS +++ b/NEWS @@ -7,6 +7,15 @@ using `glibc' in the "product" field. Version 2.37.1 +Security related changes: + + CVE-2023-25139: When the printf family of functions is called with a + format specifier that uses an (enable grouping) and a + minimum width specifier, the resulting output could be larger than + reasonably expected by a caller that computed a tight bound on the + buffer size. The resulting larger than expected output could result + in a buffer overflow in the printf family of functions. + The following bugs are resolved with this release: [30053] time: strftime %s returns -1 after 2038 on 32 bits systems