diff options
author | Florian Weimer <fweimer@redhat.com> | 2018-02-06 09:19:03 +0100 |
---|---|---|
committer | Florian Weimer <fweimer@redhat.com> | 2018-02-06 09:21:00 +0100 |
commit | bdac1623cca4c3d1683e24cc7d093201c5d9fa26 (patch) | |
tree | e1dc2a6e881c5841e1332c010db5753bf46473fd /NEWS | |
parent | 23158b08a0908f381459f273a984c6fd328363cb (diff) | |
download | glibc-bdac1623cca4c3d1683e24cc7d093201c5d9fa26.tar.gz glibc-bdac1623cca4c3d1683e24cc7d093201c5d9fa26.tar.xz glibc-bdac1623cca4c3d1683e24cc7d093201c5d9fa26.zip |
Record CVE-2018-6551 in NEWS and ChangeLog [BZ #22774]
(cherry picked from commit 71aa429b029fdb6f9e65d44050388b51eca460d6)
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/NEWS b/NEWS index a71c1038a8..0f7b0d5a9a 100644 --- a/NEWS +++ b/NEWS @@ -262,6 +262,10 @@ Security related changes: an object size near the value of SIZE_MAX, would return a pointer to a buffer which is too small, instead of NULL. Reported by Jakub Wilk. + CVE-2018-6551: The malloc function, when called with an object size near + the value of SIZE_MAX, would return a pointer to a buffer which is too + small, instead of NULL. + The following bugs are resolved with this release: [866] glob: glob should match dangling symlinks |