From 321e26847188300173a5dc0ca42c2ff7b9bf7a78 Mon Sep 17 00:00:00 2001 From: Will Newton Date: Wed, 9 Oct 2013 14:41:57 +0100 Subject: malloc/hooks.c: Correct check for overflow in memalign_check. A large value of bytes passed to memalign_check can cause an integer overflow in _int_memalign and heap corruption. This issue can be exposed by running tst-memalign with MALLOC_CHECK_=3. ChangeLog: 2013-10-10 Will Newton * malloc/hooks.c (memalign_check): Ensure the value of bytes passed to _int_memalign does not overflow. --- ChangeLog | 5 +++++ 1 file changed, 5 insertions(+) (limited to 'ChangeLog') diff --git a/ChangeLog b/ChangeLog index 1291b75..66780cb 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,8 @@ +2013-10-10 Will Newton + + * malloc/hooks.c (memalign_check): Ensure the value of bytes + passed to _int_memalign does not overflow. + 2013-10-10 Torvald Riegel * scripts/bench.pl: Add include-sources directive. -- cgit v1.1