aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFlorian Weimer <fweimer@redhat.com>2018-02-01 15:00:44 +0100
committerTulio Magno Quites Machado Filho <tuliom@linux.ibm.com>2018-04-06 16:27:42 -0300
commit436359fd41343c1db0616bd90e8a05bf188f237c (patch)
tree7388bd074fd2e13e2bc8992b1f13c3e1971e3b40
parent407ec876262f0e6f55635ea0783f1f4a6c5d127f (diff)
downloadglibc-436359fd41343c1db0616bd90e8a05bf188f237c.zip
glibc-436359fd41343c1db0616bd90e8a05bf188f237c.tar.gz
glibc-436359fd41343c1db0616bd90e8a05bf188f237c.tar.bz2
Record CVE-2018-6485 in ChangeLog and NEWS [BZ #22343]
(cherry picked from commit 4590634fd65162568b9f52fb4beb60aa25da37f2)
-rw-r--r--ChangeLog1
-rw-r--r--NEWS4
2 files changed, 5 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index a01b406..e92c110 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,6 +1,7 @@
2018-01-18 Arjun Shankar <arjun@redhat.com>
[BZ #22343]
+ CVE-2018-6485
* malloc/malloc.c (checked_request2size): call REQUEST_OUT_OF_RANGE
after padding.
(_int_memalign): check for integer overflow before calling
diff --git a/NEWS b/NEWS
index d7c016c..ac8901e 100644
--- a/NEWS
+++ b/NEWS
@@ -87,6 +87,10 @@ Version 2.22.1
dynamic linker. (The glibc project disputes that this is a security
vulnerability; only trusted binaries must be examined using the ldd
script.)
+
+* CVE-2018-6485: The posix_memalign and memalign functions, when called with
+ an object size near the value of SIZE_MAX, would return a pointer to a
+ buffer which is too small, instead of NULL. Reported by Jakub Wilk.
Version 2.22