From bdac1623cca4c3d1683e24cc7d093201c5d9fa26 Mon Sep 17 00:00:00 2001 From: Florian Weimer Date: Tue, 6 Feb 2018 09:19:03 +0100 Subject: Record CVE-2018-6551 in NEWS and ChangeLog [BZ #22774] (cherry picked from commit 71aa429b029fdb6f9e65d44050388b51eca460d6) --- ChangeLog | 2 ++ NEWS | 4 ++++ 2 files changed, 6 insertions(+) diff --git a/ChangeLog b/ChangeLog index f3fe2716b2..76e2767086 100644 --- a/ChangeLog +++ b/ChangeLog @@ -710,7 +710,9 @@ 2018-01-18 Arjun Shankar [BZ #22343] + [BZ #22774] CVE-2018-6485 + CVE-2018-6551 * malloc/malloc.c (checked_request2size): call REQUEST_OUT_OF_RANGE after padding. (_int_memalign): check for integer overflow before calling diff --git a/NEWS b/NEWS index a71c1038a8..0f7b0d5a9a 100644 --- a/NEWS +++ b/NEWS @@ -262,6 +262,10 @@ Security related changes: an object size near the value of SIZE_MAX, would return a pointer to a buffer which is too small, instead of NULL. Reported by Jakub Wilk. + CVE-2018-6551: The malloc function, when called with an object size near + the value of SIZE_MAX, would return a pointer to a buffer which is too + small, instead of NULL. + The following bugs are resolved with this release: [866] glob: glob should match dangling symlinks -- cgit v1.2.1