CVE-2017-12133

Priority
Low
Description
The DNS stub resolver in the GNU C Library (glibc) before version 2.26,
when EDNS support is enabled, will solicit large UDP responses from name
servers, potentially simplifying off-path DNS spoofing attackers due to IP
fragmentation.
References
Bugs
Notes
 chrisccoulson> The CVE description doesn't seem to match the description
  in the linked bug report and upstream patch
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 17.10 (Artful Aardvark):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Package
Source: glibc (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 17.10 (Artful Aardvark):not-affected (2.26-0ubuntu2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.26-0ubuntu2)
Patches:
Patch:https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=patch;h=d42eed4a044e5e10dfb885cf9891c2518a72a491
More Information

Updated: 2018-01-17 14:14:16 UTC (commit 14018)