[COMMITTED] Record CVE-2018-6551 in NEWS and ChangeLog [BZ #22774]

Message ID 71de7bc7-a676-9e8f-b9e5-9b65dd85f6da@redhat.com
State Committed
Headers

Commit Message

Florian Weimer Feb. 6, 2018, 8:20 a.m. UTC
  commit 71aa429b029fdb6f9e65d44050388b51eca460d6
Author: Florian Weimer <fweimer@redhat.com>
Date:   Tue Feb 6 09:19:03 2018 +0100

    Record CVE-2018-6551 in NEWS and ChangeLog [BZ #22774]
  

Patch

diff --git a/ChangeLog b/ChangeLog
index ca221a4ebe..e6e29b1e11 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -999,7 +999,9 @@ 
 2018-01-18  Arjun Shankar  <arjun@redhat.com>
 
 	[BZ #22343]
+	[BZ #22774]
 	CVE-2018-6485
+	CVE-2018-6551
 	* malloc/malloc.c (checked_request2size): call REQUEST_OUT_OF_RANGE
 	after padding.
 	(_int_memalign): check for integer overflow before calling
diff --git a/NEWS b/NEWS
index 06ae43d3f0..3629944946 100644
--- a/NEWS
+++ b/NEWS
@@ -291,6 +291,10 @@  Security related changes:
   an object size near the value of SIZE_MAX, would return a pointer to a
   buffer which is too small, instead of NULL.  Reported by Jakub Wilk.
 
+  CVE-2018-6551: The malloc function, when called with an object size near
+  the value of SIZE_MAX, would return a pointer to a buffer which is too
+  small, instead of NULL.
+
 The following bugs are resolved with this release:
 
   [866] glob: glob should match dangling symlinks