CVE-2017-17426
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
05/12/2017
Last modified:
20/04/2025
Description
The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://sourceware.org/bugzilla/show_bug.cgi?id=22375
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh%3D34697694e8a93b325b18f25f7dcded55d6baeaf6
- https://sourceware.org/bugzilla/show_bug.cgi?id=22375
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh%3D34697694e8a93b325b18f25f7dcded55d6baeaf6



