- 6652, 12926, 14132, 14138, 14171, 15215, 15884, 17266, 17344, 17363,
- 17370, 17371, 17411, 17460, 17475, 17485, 17501, 17506, 17508, 17522,
- 17555, 17570, 17571, 17572, 17573, 17574, 17582, 17583, 17584, 17585,
- 17589, 17594, 17616.
+ 6652, 10672, 12847, 12926, 13862, 14132, 14138, 14171, 14498, 15215,
+ 15884, 16009, 16191, 16469, 16617, 16619, 16657, 16740, 16857, 17192,
+ 17266, 17273, 17344, 17363, 17370, 17371, 17411, 17460, 17475, 17485,
+ 17501, 17506, 17508, 17522, 17555, 17570, 17571, 17572, 17573, 17574,
+ 17582, 17583, 17584, 17585, 17589, 17594, 17601, 17608, 17616, 17625,
+ 17630, 17633, 17634, 17635, 17647, 17653, 17657, 17658, 17664, 17665,
+ 17668, 17682, 17717, 17719, 17722, 17723, 17724, 17725, 17732, 17733,
+ 17744, 17745, 17746, 17747, 17748, 17775, 17777, 17780, 17781, 17782,
+ 17791, 17793, 17796, 17797, 17803, 17806, 17834
+
+* Optimized strcpy, stpcpy, strncpy, stpncpy, strcmp, and strncmp
+ implementations for powerpc64/powerpc64le.
+ Implemented by Adhemerval Zanella (IBM).
+
+* Added support for TSX lock elision of pthread mutexes on powerpc32, powerpc64
+ and powerpc64le. This may improve lock scaling of existing programs on
+ HTM capable systems. The lock elision code is only enabled with
+ --enable-lock-elision=yes. Also, the TSX lock elision implementation for
+ powerpc will issue a transaction abort on every syscall to avoid side
+ effects being visible outside transactions.
+
+* Optimized strcpy, stpcpy, strchrnul and strrchr implementations for
+ AArch64. Contributed by ARM Ltd.
+
+* i386 memcpy functions optimized with SSE2 unaligned load/store.
+
+* CVE-2104-7817 The wordexp function could ignore the WRDE_NOCMD flag
+ under certain input conditions resulting in the execution of a shell for
+ command substitution when the applicaiton did not request it. The
+ implementation now checks WRDE_NOCMD immediately before executing the
+ shell and returns the error WRDE_CMDSUB as expected.
+
+* CVE-2012-3406 printf-style functions could run into a stack overflow when
+ processing format strings with a large number of format specifiers.
+
+* CVE-2014-9402 The nss_dns implementation of getnetbyname could run into an
+ infinite loop if the DNS response contained a PTR record of an unexpected
+ format.