[COMMITTED] Add references to CVE-2017-18269, CVE-2018-11236, CVE-2018-11237

Message ID a0c7db0f-b81b-3f7e-4f99-e3047085fbe5@redhat.com
State Committed
Headers

Commit Message

Florian Weimer May 24, 2018, 10:22 a.m. UTC
  This patch is just a ChangeLog and NEWS update for CVE assignments. 
Committed.

Thanks,
Florian
  

Patch

commit 43d4f3d5ad94e1fa5e56d7a7200d0e9f3d8e2f02
Author: Florian Weimer <fweimer@redhat.com>
Date:   Thu May 24 12:19:11 2018 +0200

    Add references to CVE-2017-18269, CVE-2018-11236, CVE-2018-11237

diff --git a/ChangeLog b/ChangeLog
index 56a3aa337d..e01136c6eb 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -817,6 +817,7 @@ 
 2018-05-09  Paul Pluzhnikov  <ppluzhnikov@google.com>
 
 	[BZ #22786]
+	CVE-2018-11236
 	* stdlib/canonicalize.c (__realpath): Fix overflow in path length
 	computation.
 	* stdlib/Makefile (test-bz22786): New test.
@@ -2676,6 +2677,7 @@ 
 	    Max Horn  <max@quendi.de>
 
 	[BZ #22644]
+	CVE-2017-18269
 	* sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S: Fixed
 	branch conditions.
 	* string/test-memmove.c (do_test2): New testcase.
diff --git a/NEWS b/NEWS
index 1577f4310f..e2a6f45121 100644
--- a/NEWS
+++ b/NEWS
@@ -109,6 +109,17 @@  Security related changes:
   the system-provided libidn2 library instead.  Originally reported by Hanno
   Böck and Christian Weisgerber.
 
+  CVE-2017-18269: An SSE2-based memmove implementation for the i386
+  architecture could corrupt memory.  Reported by Max Horn.
+
+  CVE-2018-11236: Very long pathname arguments to realpath function could
+  result in an integer overflow and buffer overflow.  Reported by Alexey
+  Izbyshev.
+
+  CVE-2018-11237: The mempcpy implementation for the Intel Xeon Phi
+  architecture could write beyond the target buffer, resulting in a buffer
+  overflow.  Reported by Andreas Schwab.
+
 The following bugs are resolved with this release:
 
   [The release manager will add the list generated by