CVE-2018-6551

NameCVE-2018-6551
DescriptionThe malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glibc (PTS)jessie (security), jessie2.19-18+deb8u10fixed
stretch2.24-11+deb9u3vulnerable
stretch (security)2.24-11+deb9u1vulnerable
buster2.27-8fixed
sid2.28-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
eglibcsource(unstable)(not affected)
glibcsource(unstable)2.27-1high
glibcsourceexperimental2.26.9000+20180127.7e23a7dd-0experimental0high
glibcsourcejessie(not affected)

Notes

[stretch] - glibc <no-dsa> (Minor issue)
[jessie] - glibc <not-affected> (Issue introduced in 2.24, 2.26 only for i386)
- eglibc <not-affected> (Issue introduced in 2.24 for powerpc, 2.26 only for i386)
https://sourceware.org/bugzilla/show_bug.cgi?id=22774
Fixed by: https://sourceware.org/git/?p=glibc.git;a=commit;h=8e448310d74b283c5cd02b9ed7fb997b47bf9b22

Search for package or bug name: Reporting problems