CVE-2017-12133

Published: 07 September 2017

Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.

Priority

Low

CVSS 3 base score: 5.9

Status

Package Release Status
eglibc
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.10 (Groovy Gorilla) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Needed

glibc
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(2.26-0ubuntu2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.26-0ubuntu2)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(2.26-0ubuntu2)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (2.23-0ubuntu11.2)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d42eed4a044e5e10dfb885cf9891c2518a72a491 (master)
Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=045e368799cd253ddbf8bdec42ed92e8ebb3ce67 (2.25)
Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=36f173ab3709b4a920a833b9af67f30bcba1ea01 (2.24)

Notes

AuthorNote
chrisccoulson
The CVE description doesn't seem to match the description
in the linked bug report and upstream patch
sbeattie
introduced in CVE-2016-4429 fix

References

Bugs