{"id":"UBUNTU-CVE-2017-17426","details":"The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.","modified":"2026-01-30T00:47:52.079317Z","published":"2017-12-05T00:00:00Z","withdrawn":"2025-07-18T16:44:16Z","related":["USN-3534-1"],"upstream":["CVE-2017-17426"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17426"},{"type":"REPORT","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22375"},{"type":"REPORT","url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=34697694e8a93b325b18f25f7dcded55d6baeaf6"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3534-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-17426"}],"affected":[{"package":{"name":"glibc","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/glibc@2.27-3ubuntu1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.27-3ubuntu1"}]}],"versions":["2.26-0ubuntu2","2.26-0ubuntu2.1","2.27-0ubuntu2","2.27-0ubuntu3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2.27-3ubuntu1","binary_name":"glibc-doc"},{"binary_version":"2.27-3ubuntu1","binary_name":"glibc-source"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc-bin"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc-bin-dbgsym"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc-dev-bin"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc-dev-bin-dbgsym"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-amd64"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-amd64-dbgsym"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-armel"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-armel-dbgsym"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-dbg"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-dev"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-dev-amd64"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-dev-armel"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-dev-i386"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-dev-s390"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-dev-x32"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-i386"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-i386-dbgsym"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-pic"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-s390"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-s390-dbgsym"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-udeb"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-x32"},{"binary_version":"2.27-3ubuntu1","binary_name":"libc6-x32-dbgsym"},{"binary_version":"2.27-3ubuntu1","binary_name":"locales"},{"binary_version":"2.27-3ubuntu1","binary_name":"locales-all"},{"binary_version":"2.27-3ubuntu1","binary_name":"multiarch-support"},{"binary_version":"2.27-3ubuntu1","binary_name":"nscd"},{"binary_version":"2.27-3ubuntu1","binary_name":"nscd-dbgsym"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-17426.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}