diff options
author | Florian Weimer <fweimer@redhat.com> | 2018-05-24 12:19:11 +0200 |
---|---|---|
committer | Florian Weimer <fweimer@redhat.com> | 2018-05-24 12:19:11 +0200 |
commit | 43d4f3d5ad94e1fa5e56d7a7200d0e9f3d8e2f02 (patch) | |
tree | 19d9d4fb30b78047622af56fd40653bc647efbcf /NEWS | |
parent | 1dfeb17e67a194b48c78c09b1b4f788ab0bec938 (diff) | |
download | glibc-43d4f3d5ad94e1fa5e56d7a7200d0e9f3d8e2f02.zip glibc-43d4f3d5ad94e1fa5e56d7a7200d0e9f3d8e2f02.tar.gz glibc-43d4f3d5ad94e1fa5e56d7a7200d0e9f3d8e2f02.tar.bz2 |
Add references to CVE-2017-18269, CVE-2018-11236, CVE-2018-11237
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 11 |
1 files changed, 11 insertions, 0 deletions
@@ -109,6 +109,17 @@ Security related changes: the system-provided libidn2 library instead. Originally reported by Hanno Böck and Christian Weisgerber. + CVE-2017-18269: An SSE2-based memmove implementation for the i386 + architecture could corrupt memory. Reported by Max Horn. + + CVE-2018-11236: Very long pathname arguments to realpath function could + result in an integer overflow and buffer overflow. Reported by Alexey + Izbyshev. + + CVE-2018-11237: The mempcpy implementation for the Intel Xeon Phi + architecture could write beyond the target buffer, resulting in a buffer + overflow. Reported by Andreas Schwab. + The following bugs are resolved with this release: [The release manager will add the list generated by |