Integer overflow in Glibc - CVE-2017-17426
Published: December 5, 2017 / Updated: August 8, 2020
Glibc
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.