CVE-2017-17426

Priority
Medium
Description
The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could
return a memory block that is too small if an attempt is made to allocate
an object whose size is close to SIZE_MAX, potentially leading to a
subsequent heap overflow. This occurs because the per-thread cache (aka
tcache) feature enables a code path that lacks an integer overflow check.
References
Package
Upstream:not-affected
Ubuntu 12.04 ESM (Precise Pangolin):not-affected
Ubuntu 14.04 LTS (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 17.10 (Artful Aardvark):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Package
Source: glibc (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Ubuntu 17.10 (Artful Aardvark):released (2.26-0ubuntu2.1)
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 18.10 (Cosmic Cuttlefish):needed
Patches:
Upstream:https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=34697694e8a93b325b18f25f7dcded55d6baeaf6
More Information

Updated: 2018-06-26 04:12:08 UTC (commit 7799c934cca373482531a7b00e4dfe82302ceae5)