diff options
author | Florian Weimer <fweimer@redhat.com> | 2018-02-01 15:00:44 +0100 |
---|---|---|
committer | Tulio Magno Quites Machado Filho <tuliom@linux.ibm.com> | 2018-04-06 16:27:42 -0300 |
commit | 436359fd41343c1db0616bd90e8a05bf188f237c (patch) | |
tree | 7388bd074fd2e13e2bc8992b1f13c3e1971e3b40 | |
parent | 407ec876262f0e6f55635ea0783f1f4a6c5d127f (diff) | |
download | glibc-436359fd41343c1db0616bd90e8a05bf188f237c.zip glibc-436359fd41343c1db0616bd90e8a05bf188f237c.tar.gz glibc-436359fd41343c1db0616bd90e8a05bf188f237c.tar.bz2 |
Record CVE-2018-6485 in ChangeLog and NEWS [BZ #22343]
(cherry picked from commit 4590634fd65162568b9f52fb4beb60aa25da37f2)
-rw-r--r-- | ChangeLog | 1 | ||||
-rw-r--r-- | NEWS | 4 |
2 files changed, 5 insertions, 0 deletions
@@ -1,6 +1,7 @@ 2018-01-18 Arjun Shankar <arjun@redhat.com> [BZ #22343] + CVE-2018-6485 * malloc/malloc.c (checked_request2size): call REQUEST_OUT_OF_RANGE after padding. (_int_memalign): check for integer overflow before calling @@ -87,6 +87,10 @@ Version 2.22.1 dynamic linker. (The glibc project disputes that this is a security vulnerability; only trusted binaries must be examined using the ldd script.) + +* CVE-2018-6485: The posix_memalign and memalign functions, when called with + an object size near the value of SIZE_MAX, would return a pointer to a + buffer which is too small, instead of NULL. Reported by Jakub Wilk. Version 2.22 |