diff options
author | Florian Weimer <fweimer@redhat.com> | 2021-01-29 18:20:54 +0100 |
---|---|---|
committer | Raphael Moreira Zinsly <rzinsly@linux.ibm.com> | 2021-03-18 18:08:42 -0300 |
commit | 889122cbfacedab8fdb62a9d3fd6244d528ea99c (patch) | |
tree | d9d4f834b14302ce4bce0e3ed261153ef7ff4358 | |
parent | fa4162af6fc91fde8ed1c31e38a67736b7ef1ece (diff) | |
download | glibc-889122cbfacedab8fdb62a9d3fd6244d528ea99c.tar.gz glibc-889122cbfacedab8fdb62a9d3fd6244d528ea99c.tar.xz glibc-889122cbfacedab8fdb62a9d3fd6244d528ea99c.zip |
NEWS: Fix typo in CVE-2021-3326 entry
-rw-r--r-- | NEWS | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/NEWS b/NEWS index b743fba3c7..66efd8e32b 100644 --- a/NEWS +++ b/NEWS @@ -33,7 +33,7 @@ CVE-2020-29562: An assertion failure has been fixed in the iconv function when invoked with UCS4 input containing an invalid character. CVE-2021-3326: An assertion failure during conversion from the - qISO-20220-JP-3 character set using the iconv function has been fixed. + ISO-20220-JP-3 character set using the iconv function has been fixed. This assertion was triggered by certain valid inputs in which the converted output contains a combined sequence of two wide characters crossing a buffer boundary. Reported by Tavis Ormandy. |