about summary refs log tree commit diff
diff options
context:
space:
mode:
authorFlorian Weimer <fweimer@redhat.com>2018-02-01 15:00:44 +0100
committerTulio Magno Quites Machado Filho <tuliom@linux.ibm.com>2018-04-06 16:27:42 -0300
commit436359fd41343c1db0616bd90e8a05bf188f237c (patch)
tree7388bd074fd2e13e2bc8992b1f13c3e1971e3b40
parent407ec876262f0e6f55635ea0783f1f4a6c5d127f (diff)
downloadglibc-436359fd41343c1db0616bd90e8a05bf188f237c.tar.gz
glibc-436359fd41343c1db0616bd90e8a05bf188f237c.tar.xz
glibc-436359fd41343c1db0616bd90e8a05bf188f237c.zip
Record CVE-2018-6485 in ChangeLog and NEWS [BZ #22343]
(cherry picked from commit 4590634fd65162568b9f52fb4beb60aa25da37f2)
-rw-r--r--ChangeLog1
-rw-r--r--NEWS4
2 files changed, 5 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index a01b406e42..e92c110602 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,6 +1,7 @@
 2018-01-18  Arjun Shankar  <arjun@redhat.com>
 
 	[BZ #22343]
+	CVE-2018-6485
 	* malloc/malloc.c (checked_request2size): call REQUEST_OUT_OF_RANGE
 	after padding.
 	(_int_memalign): check for integer overflow before calling
diff --git a/NEWS b/NEWS
index d7c016c021..ac8901e05d 100644
--- a/NEWS
+++ b/NEWS
@@ -87,6 +87,10 @@ Version 2.22.1
   dynamic linker.  (The glibc project disputes that this is a security
   vulnerability; only trusted binaries must be examined using the ldd
   script.)
+
+* CVE-2018-6485: The posix_memalign and memalign functions, when called with
+  an object size near the value of SIZE_MAX, would return a pointer to a
+  buffer which is too small, instead of NULL.  Reported by Jakub Wilk.
 
 Version 2.22