CVE-2017-17426 REJECTED

The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.

EPSS 0.36% · 57.8th percentile

Risk Scores

EPSS Score
0.36%
57.8th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSglibc0, 2.26-0ubuntu2, 2.26-0ubuntu2.1

Timeline

References

Open in Interactive Console →