glibc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the glibc package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
CVE-2024-33602

<2.31-13+deb11u10
  • L
CVE-2024-33600

<2.31-13+deb11u10
  • L
CVE-2024-33601

<2.31-13+deb11u10
  • L
CVE-2024-33599

<2.31-13+deb11u10
  • L
CVE-2024-2961

<2.31-13+deb11u9
  • H
Out-of-bounds Write

<2.31-13+deb11u7
  • L
Use After Free

*
  • L
Use After Free

*
  • M
Buffer Overflow

<2.22-1
  • H
Off-by-one Error

<2.31-13+deb11u4
  • C
Buffer Overflow

<2.31-13+deb11u3
  • C
Buffer Overflow

<2.31-13+deb11u3
  • H
CVE-2021-43396

<2.31-13+deb11u3
  • C
Integer Overflow or Wraparound

<2.31-13
  • C
Use After Free

<2.31-13+deb11u3
  • L
Double Free

<2.31-10
  • H
Reachable Assertion

<2.31-10
  • M
Out-of-bounds Read

<2.31-9
  • H
Out-of-bounds Write

<2.23-1
  • M
Reachable Assertion

<2.31-7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.31-5
  • C
Unchecked Return Value

<2.2-1
  • L
Integer Underflow

<2.31-2
  • H
Out-of-bounds Write

<2.30-3
  • H
Use After Free

<2.30-3
  • M
Out-of-Bounds

<2.30-1
  • L
Information Exposure

<2.29-8
  • L
Information Exposure

*
  • L
CVE-2019-1010023

*
  • L
Use of Insufficiently Random Values

*
  • L
Out-of-Bounds

*
  • C
Out-of-Bounds

<2.3.5-3
  • M
Improper Data Handling

<2.5-1
  • L
Uncontrolled Recursion

*
  • C
Out-of-bounds Read

<2.28-9
  • H
Improper Data Handling

<2.28-1
  • L
Uncontrolled Recursion

*
  • L
CVE-2019-7309

<2.28-6
  • M
Improper Input Validation

<2.28-6
  • L
Improper Resource Shutdown or Release

<2.28-6
  • H
Improper Input Validation

<2.28-1
  • L
Out-of-bounds Write

<2.27-4
  • L
Out-of-bounds Write

<2.27-4
  • C
Out-of-Bounds

<2.27-3
  • C
Out-of-bounds Write

<2.27-1
  • C
Out-of-bounds Write

<2.27-1
  • H
Missing Release of Resource after Effective Lifetime

<2.25-5
  • H
Out-of-Bounds

<2.25-5
  • H
Out-of-bounds Write

<2.26-4
  • H
Untrusted Search Path

<2.25-6
  • L
Out-of-Bounds

<2.25-3
  • L
Missing Release of Resource after Effective Lifetime

<2.25-3
  • L
Out-of-Bounds

<2.25-3
  • M
Out-of-Bounds

<2.15
  • M
Use After Free

<2.24-15
  • M
Allocation of Resources Without Limits or Throttling

<2.25-1
  • L
NULL Pointer Dereference

<2.24-9
  • H
Out-of-Bounds

<2.24-12
  • C
Out-of-Bounds

<2.19-14
  • M
Out-of-bounds Read

<2.21-1
  • H
Integer Overflow or Wraparound

<2.21-1
  • L
Improper Data Handling

<2.28-1
  • H
Integer Overflow or Wraparound

<2.21-1
  • L
Improper Input Validation

<2.31-3
  • H
Resource Management Errors

<2.22-4
  • H
Improper Access Control

<2.24-1
  • H
Improper Input Validation

<2.22-8
  • M
Out-of-bounds Write

<2.22-10
  • H
Out-of-Bounds

<2.22-6
  • H
Out-of-Bounds

<2.22-8
  • C
Out-of-Bounds

<2.21-7
  • C
Out-of-Bounds

<2.21-8
  • C
Numeric Errors

<2.21-7
  • C
Out-of-Bounds

<2.23-1
  • L
Access Restriction Bypass

<2.21-1
  • H
Out-of-Bounds

<2.21-8
  • M
Security Features

<2.21-1
  • H
Out-of-Bounds

<2.21-1
  • M
Out-of-Bounds

<2.19-20
  • M
Code

<2.15-1
  • M
Out-of-Bounds

<2.19-15
  • H
Out-of-Bounds

<2.19-15
  • L
Code

<2.21-1
  • H
Resource Management Errors

<2.19-14
  • M
Code

<2.19-1
  • H
Out-of-bounds Write

<2.18-1
  • M
Out-of-Bounds

<2.19-12
  • M
Improper Input Validation

<2.17-1
  • M
Improper Input Validation

<2.19-14
  • L
Arbitrary Code Injection

<2.19-2
  • M
Numeric Errors

<2.19-10
  • M
Directory Traversal

<2.19-6
  • L
Numeric Errors

<2.13-35
  • L
Access Restriction Bypass

<2.19-14
  • L
Numeric Errors

<2.13-35
  • L
Out-of-Bounds

<2.18-1
  • L
Out-of-Bounds

<2.17-94
  • M
Numeric Errors

<2.17-93
  • L
Access Restriction Bypass

<2.21-1
  • L
Numeric Errors

<2.17-94
  • M
Out-of-Bounds

<2.17-94
  • L
Improper Input Validation

<2.17-94
  • M
Numeric Errors

<2.13-24
  • L
Out-of-Bounds

<2.17-2
  • L
Out-of-Bounds

<2.17-2
  • M
Numeric Errors

<2.13-36
  • M
Configuration

<2.13-8
  • H
Access Restriction Bypass

<2.13-16
  • M
Resource Management Errors

<2.11.2-12
  • M
Numeric Errors

<2.13-8
  • H
Access Restriction Bypass

<2.10.1-7
  • L
Resource Management Errors

*
  • L
CVE-2010-4051

<2.19-4
  • L
Resource Management Errors

<2.19-4
  • H
Link Following

<2.11.2-8
  • H
Access Restriction Bypass

<2.11.2-8
  • L
Numeric Errors

<2.11.1-1
  • L
Numeric Errors

<2.11.1-1
  • H
Improper Input Validation

<2.11-1
  • M
Numeric Errors

<2.11-1
  • M
Credentials Management

<2.10.2-4
  • L
Numeric Errors

<2.11-1
  • H
Resource Management Errors

<2.7-8
  • C
Numeric Errors

<2.2-1
  • L
Improper Input Validation

<2.7-1
  • L
Numeric Errors

<2.6-2
  • M
CVE-2004-0968

<2.3.2.ds1-19
  • L
CVE-2004-1453

<2.3.5
  • M
CVE-2004-1382

<2.3.2.ds1-19
  • H
CVE-2003-0689

<2.2.5
  • H
CVE-2003-0028

<2.3.1-16
  • M
CVE-2002-1146

<2.3
  • C
CVE-2002-0391

<2.2.5-13
  • H
CVE-2002-0684

<2.2.5-8
  • H
CVE-2002-0651

<2.2.5-8