mirror of
git://sourceware.org/git/glibc.git
synced 2025-04-12 14:21:18 +08:00
Record CVE-2018-6551 in NEWS and ChangeLog [BZ #22774]
(cherry picked from commit 71aa429b029fdb6f9e65d44050388b51eca460d6)
This commit is contained in:
parent
23158b08a0
commit
bdac1623cc
@ -710,7 +710,9 @@
|
||||
2018-01-18 Arjun Shankar <arjun@redhat.com>
|
||||
|
||||
[BZ #22343]
|
||||
[BZ #22774]
|
||||
CVE-2018-6485
|
||||
CVE-2018-6551
|
||||
* malloc/malloc.c (checked_request2size): call REQUEST_OUT_OF_RANGE
|
||||
after padding.
|
||||
(_int_memalign): check for integer overflow before calling
|
||||
|
4
NEWS
4
NEWS
@ -262,6 +262,10 @@ Security related changes:
|
||||
an object size near the value of SIZE_MAX, would return a pointer to a
|
||||
buffer which is too small, instead of NULL. Reported by Jakub Wilk.
|
||||
|
||||
CVE-2018-6551: The malloc function, when called with an object size near
|
||||
the value of SIZE_MAX, would return a pointer to a buffer which is too
|
||||
small, instead of NULL.
|
||||
|
||||
The following bugs are resolved with this release:
|
||||
|
||||
[866] glob: glob should match dangling symlinks
|
||||
|
Loading…
x
Reference in New Issue
Block a user