Date: Thu, 19 Oct 2017 16:13:37 -0400 From: Rich Felker <dalias@...c.org> To: musl@...ts.openwall.com Subject: musl 1.1.17 released *** Due to at least one fairly serious security bug, all users should upgrade or patch. *** This release fixes numerous bugs affecting visible behavior and safety/internal consistency, including a stack-based buffer overflow in dns parsing and multiple sources of invalid memory accesses that may lead to crashes. See the release notes in WHATSNEW for details. Many new features have also been added, including deferred symbol binding in the dynamic linker (RTLD_LAZY emulation), an option to overrid argv[0] when running ldso to execute a program, support for starting new sessions via posix_spawn (POSIX_SPAWN_SETSID, accepted for standardization), and ability to query the active thread-local locale (via _NL_LOCALE_NAME extension). Improvements in compatibility with applications, build tools, and platforms have also been made. https://www.musl-libc.org/releases/musl-1.1.17.tar.gz https://www.musl-libc.org/releases/musl-1.1.17.tar.gz.asc Special thanks to musl's release sponsors (patreon.com/musl): * Justin Cormack * Jevin Sweval * Les Aker * Neal Gompa * Hurricane Labs (hurricanelabs.com) * The Midipix Project (midipix.org)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.