aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFlorian Weimer <fweimer@redhat.com>2018-05-24 12:19:11 +0200
committerFlorian Weimer <fweimer@redhat.com>2018-05-24 12:19:11 +0200
commit43d4f3d5ad94e1fa5e56d7a7200d0e9f3d8e2f02 (patch)
tree19d9d4fb30b78047622af56fd40653bc647efbcf
parent1dfeb17e67a194b48c78c09b1b4f788ab0bec938 (diff)
Add references to CVE-2017-18269, CVE-2018-11236, CVE-2018-11237
-rw-r--r--ChangeLog2
-rw-r--r--NEWS11
2 files changed, 13 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index 56a3aa337d..e01136c6eb 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -817,6 +817,7 @@
2018-05-09 Paul Pluzhnikov <ppluzhnikov@google.com>
[BZ #22786]
+ CVE-2018-11236
* stdlib/canonicalize.c (__realpath): Fix overflow in path length
computation.
* stdlib/Makefile (test-bz22786): New test.
@@ -2676,6 +2677,7 @@
Max Horn <max@quendi.de>
[BZ #22644]
+ CVE-2017-18269
* sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S: Fixed
branch conditions.
* string/test-memmove.c (do_test2): New testcase.
diff --git a/NEWS b/NEWS
index 1577f4310f..e2a6f45121 100644
--- a/NEWS
+++ b/NEWS
@@ -109,6 +109,17 @@ Security related changes:
the system-provided libidn2 library instead. Originally reported by Hanno
Böck and Christian Weisgerber.
+ CVE-2017-18269: An SSE2-based memmove implementation for the i386
+ architecture could corrupt memory. Reported by Max Horn.
+
+ CVE-2018-11236: Very long pathname arguments to realpath function could
+ result in an integer overflow and buffer overflow. Reported by Alexey
+ Izbyshev.
+
+ CVE-2018-11237: The mempcpy implementation for the Intel Xeon Phi
+ architecture could write beyond the target buffer, resulting in a buffer
+ overflow. Reported by Andreas Schwab.
+
The following bugs are resolved with this release:
[The release manager will add the list generated by