From patchwork Thu Dec 18 01:03:17 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Allan McRae X-Patchwork-Id: 422442 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id BE55C1400B7 for ; Thu, 18 Dec 2014 12:03:44 +1100 (AEDT) DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id; q=dns; s= default; b=HRHGRnQyK4EeBRrIBH8EPIxlbPzqxntY16sSHvXzeZEKj1CYegVxs lZjhcIjdDvmmY3RZn53EMZVNL3wecfOHJMSL0bWJi3SDb/sWf33bqvEvBaCKosk8 vo2DzLMow+H2NOVScSZNqwfl95jaNulzrpBCjmqtmnGMeg99L/Fzuc= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id; s=default; bh=Fay6icK4rBxUOP6Dbmm4V/kZahs=; b=uiXsEa+aq6KgjmFJTjQlPbmADHbz UXRq81ZcTP513/Blvv8+nKQIxg6QDuQquq7eArohqUuGH/vYjhVmSInXaA5wsQZE xKKrIiMl5/tAhAr0GULUtY21cbExWglOczVrCfrcQ0j1JHDDPmFizEvLa1ahRHnd JLFo0oTZ48eTJFg= Received: (qmail 29633 invoked by alias); 18 Dec 2014 01:03:39 -0000 Mailing-List: contact libc-alpha-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-alpha-owner@sourceware.org Delivered-To: mailing list libc-alpha@sourceware.org Received: (qmail 29607 invoked by uid 89); 18 Dec 2014 01:03:35 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-2.2 required=5.0 tests=AWL, BAYES_00, SPF_PASS, T_RP_MATCHES_RCVD autolearn=ham version=3.3.2 X-HELO: nymeria.archlinux.org From: Allan McRae To: libc-alpha@sourceware.org Subject: [COMMITTED] Label CVE-2014-9402 in NEWS Date: Thu, 18 Dec 2014 11:03:17 +1000 Message-Id: <1418864597-4837-1-git-send-email-allan@archlinux.org> --- NEWS | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/NEWS b/NEWS index 05b398e..6b34b13 100644 --- a/NEWS +++ b/NEWS @@ -26,8 +26,9 @@ Version 2.21 * CVE-2012-3406 printf-style functions could run into a stack overflow when processing format strings with a large number of format specifiers. -* The nss_dns implementation of getnetbyname could run into an infinite loop - if the DNS response contained a PTR record of an unexpected format. +* CVE-2014-9402 The nss_dns implementation of getnetbyname could run into an + infinite loop if the DNS response contained a PTR record of an unexpected + format. * The minimum GCC version that can be used to build this version of the GNU C Library is GCC 4.6. Older GCC versions, and non-GNU compilers, can