[glibc/release/2.27/master] Add NEWS entry for CVE-2020-6096 (bug 25620)

Dmitry Levin ldv@sourceware.org
Mon Nov 16 20:59:59 GMT 2020


https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=daf88b1dd1a41fcb324801c02ead7a8d5aac3851

commit daf88b1dd1a41fcb324801c02ead7a8d5aac3851
Author: Aurelien Jarno <aurelien@aurel32.net>
Date:   Sun Jul 12 21:58:43 2020 +0200

    Add NEWS entry for CVE-2020-6096 (bug 25620)
    
    Reviewed-by: Carlos O'Donell <carlos@redhat.com>
    (cherry picked from commit 17400c4bcd57d84add1da3aa93248ef2efdb0ccb)

Diff:
---
 NEWS | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/NEWS b/NEWS
index cf36993718..ca2012de45 100644
--- a/NEWS
+++ b/NEWS
@@ -76,6 +76,11 @@ Security related changes:
   CVE-2020-1752: A use-after-free vulnerability in the glob function when
   expanding ~user has been fixed.
 
+  CVE-2020-6096: A signed comparison vulnerability in the ARMv7 memcpy and
+  memmove functions has been fixed.  Discovered by Jason Royes and Samual
+  Dytrych of the Cisco Security Assessment and Penetration Team (See
+  TALOS-2020-1019).
+
 The following bugs are resolved with this release:
 
   [6889] 'PWD' mentioned but not specified
@@ -159,6 +164,7 @@ The following bugs are resolved with this release:
   [25232] No const correctness for strchr et al. for Clang++
   [25414] 'glob' use-after-free bug (CVE-2020-1752)
   [25423] Array overflow in backtrace on powerpc
+  [25620] libc: Signed comparison vulnerability in the ARMv7 memcpy() (CVE-2020-6096)
 
 
 Version 2.27


More information about the Glibc-cvs mailing list