Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 19 Oct 2017 16:13:37 -0400
From: Rich Felker <dalias@...c.org>
To: musl@...ts.openwall.com
Subject: musl 1.1.17 released

*** Due to at least one fairly serious security bug, all users should
upgrade or patch. ***


This release fixes numerous bugs affecting visible behavior and
safety/internal consistency, including a stack-based buffer overflow
in dns parsing and multiple sources of invalid memory accesses that
may lead to crashes. See the release notes in WHATSNEW for details.

Many new features have also been added, including deferred symbol
binding in the dynamic linker (RTLD_LAZY emulation), an option to
overrid argv[0] when running ldso to execute a program, support for
starting new sessions via posix_spawn (POSIX_SPAWN_SETSID, accepted
for standardization), and ability to query the active thread-local
locale (via _NL_LOCALE_NAME extension). Improvements in compatibility
with applications, build tools, and platforms have also been made. 

https://www.musl-libc.org/releases/musl-1.1.17.tar.gz
https://www.musl-libc.org/releases/musl-1.1.17.tar.gz.asc

Special thanks to musl's release sponsors (patreon.com/musl):

* Justin Cormack
* Jevin Sweval
* Les Aker
* Neal Gompa
* Hurricane Labs (hurricanelabs.com)
* The Midipix Project (midipix.org)

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.