diff options
author | Dmitry V. Levin <ldv@altlinux.org> | 2017-12-15 00:30:45 +0000 |
---|---|---|
committer | Dmitry V. Levin <ldv@altlinux.org> | 2017-12-15 00:30:45 +0000 |
commit | 17357d93cbf8d71a12530e91ea405cea4adb5ab0 (patch) | |
tree | 61fcf638a0f6a8c3e2089cbe02f2a8728f399e76 | |
parent | 8f50b4a4545bf7136c0c568e85e0b4c3f64c4519 (diff) | |
download | glibc-17357d93cbf8d71a12530e91ea405cea4adb5ab0.tar.gz glibc-17357d93cbf8d71a12530e91ea405cea4adb5ab0.tar.xz glibc-17357d93cbf8d71a12530e91ea405cea4adb5ab0.zip |
NEWS: merge two sections about security related changes in 2.25.1
Commit glibc-2.25-70-g717743bb07471f95bef6ea63d9b12848ad91aaf6 introduced a second "Security related changes" section for 2.25.1. Merge them back into a single section.
-rw-r--r-- | NEWS | 11 |
1 files changed, 4 insertions, 7 deletions
diff --git a/NEWS b/NEWS index 0a8f20e371..d047d96e76 100644 --- a/NEWS +++ b/NEWS @@ -12,6 +12,10 @@ Security related changes: * The DNS stub resolver limits the advertised UDP buffer size to 1200 bytes, to avoid fragmentation-based spoofing attacks. + CVE-2017-15670: The glob function, when invoked with GLOB_TILDE, suffered + from a one-byte overflow during ~ operator processing (either on the stack + or the heap, depending on the length of the user name). + CVE-2017-15671: The glob function, when invoked with GLOB_TILDE, would sometimes fail to free memory allocated during ~ operator processing, leading to a memory leak and, potentially, to a denial @@ -38,13 +42,6 @@ The following bugs are resolved with this release: [21778] Robust mutex may deadlock [21972] assert macro requires operator== (int) for its argument type [22322] libc: [mips64] wrong bits/long-double.h installed - -Security related changes: - - CVE-2017-15670: The glob function, when invoked with GLOB_TILDE, suffered - from a one-byte overflow during ~ operator processing (either on the stack - or the heap, depending on the length of the user name). - Version 2.25 |