Direct Vulnerabilities

Known vulnerabilities in the glibc package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2026-4438

*
  • L
CVE-2026-4437

*
  • L
CVE-2026-3904

<2.36-9
  • L
CVE-2025-15281

<2.42-11
  • L
CVE-2026-0915

<2.42-8
  • L
CVE-2026-0861

<2.42-8
  • L
CVE-2025-0395

<2.40-6
  • L
CVE-2024-33601

<2.37-19
  • M
Out-of-bounds Read

<2.37-9
  • C
Buffer Overflow

<2.33-3
  • H
Off-by-one Error

<2.33-4
  • M
Incorrect Calculation of Buffer Size

<2.37-15
  • C
Integer Overflow or Wraparound

<2.31-13
  • H
Out-of-bounds Write

<2.37-15
  • H
Out-of-bounds Write

<2.23-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.31-5
  • L
Improper Resource Shutdown or Release

<2.28-6
  • C
Out-of-bounds Write

<2.27-1
  • M
Out-of-Bounds

<2.30-1
  • L
Out-of-bounds Write

<2.27-4
  • H
Missing Release of Resource after Effective Lifetime

<2.25-5
  • L
Out-of-Bounds

<2.25-3
  • H
Out-of-Bounds

<2.22-8
  • H
Improper Input Validation

<2.22-8
  • L
CVE-2025-8058

<2.41-11
  • L
CVE-2024-33600

<2.37-19
  • M
Improper Input Validation

<2.28-6
  • H
Memory Leak

<2.37-11
  • L
CVE-2024-2961

<2.37-18
  • L
Double Free

<2.31-10
  • L
Out-of-Bounds

<2.25-3
  • C
Buffer Overflow

<2.33-3
  • M
Numeric Errors

<2.19-10
  • M
Numeric Errors

<2.13-36
  • H
Improper Input Validation

<2.28-1
  • H
Out-of-bounds Write

<2.37-15
  • M
Out-of-bounds Read

<2.31-9
  • M
Allocation of Resources Without Limits or Throttling

<2.25-1
  • L
Numeric Errors

<2.11.1-1
  • L
CVE-2025-5745

<2.41-9
  • C
Numeric Errors

<2.21-7
  • H
Improper Access Control

<2.24-1
  • L
CVE-2024-33599

<2.37-19
  • L
Out-of-Bounds

<2.17-94
  • H
Access Restriction Bypass

<2.10.1-7
  • C
Out-of-Bounds

<2.23-1
  • H
CVE-2002-0651

<2.2.5-8
  • L
Code

<2.21-1
  • C
Use After Free

<2.32-1
  • M
Buffer Overflow

<2.22-1
  • L
CVE-2019-7309

<2.28-6
  • M
Directory Traversal

<2.19-6
  • H
Out-of-Bounds

<2.21-1
  • H
Reachable Assertion

<2.31-10
  • L
Numeric Errors

<2.13-35
  • M
Numeric Errors

<2.13-8
  • C
Unchecked Return Value

<2.2-1
  • L
Access Restriction Bypass

<2.21-1
  • L
Use of Insufficiently Random Values

*
  • M
Use After Free

<2.36-3
  • L
CVE-2019-1010023

*
  • L
Information Exposure

*
  • H
Out-of-bounds Read

<2.33-4
  • L
Out-of-Bounds

<2.17-2
  • C
Out-of-bounds Write

<2.27-1
  • L
Information Exposure

<2.29-8
  • M
Configuration

<2.13-8
  • M
Use After Free

<2.24-15
  • L
Out-of-bounds Write

<2.27-4
  • H
Resource Management Errors

<2.7-8
  • C
Out-of-Bounds

<2.27-3
  • L
Improper Input Validation

<2.7-1
  • H
CVE-2002-0684

<2.2.5-8
  • C
Out-of-Bounds

<2.21-8
  • L
Integer Underflow

<2.31-2
  • M
Out-of-bounds Read

<2.21-1
  • H
Out-of-Bounds

<2.19-15
  • C
Out-of-Bounds

<2.19-14
  • H
Integer Overflow or Wraparound

<2.21-1
  • L
Improper Input Validation

<2.31-3
  • L
CVE-2024-33602

<2.37-19
  • L
CVE-2025-5702

<2.41-9
  • M
Improper Input Validation

<2.19-14
  • H
Out-of-Bounds

<2.21-8
  • M
Security Features

<2.21-1
  • H
Resource Management Errors

<2.19-14
  • L
Improper Input Validation

<2.17-94
  • M
Improper Input Validation

<2.17-1
  • H
Out-of-Bounds

<2.24-12
  • M
Reachable Assertion

<2.31-7
  • L
Out-of-Bounds

<2.17-2
  • M
Use After Free

<2.37-10
  • M
Out-of-Bounds

<2.19-20
  • H
Out-of-bounds Write

<2.30-3
  • M
Resource Management Errors

<2.11.2-12
  • M
Out-of-Bounds

<2.19-15
  • H
Access Restriction Bypass

<2.13-16
  • L
Resource Management Errors

<2.19-4
  • M
Credentials Management

<2.10.2-4
  • L
Uncontrolled Recursion

*
  • H
Out-of-bounds Write

<2.26-4
  • H
Out-of-bounds Write

<2.18-1
  • H
Out-of-Bounds

<2.25-5
  • M
Numeric Errors

<2.13-24
  • H
Access Restriction Bypass

<2.11.2-8
  • L
Missing Release of Resource after Effective Lifetime

<2.25-3
  • L
Numeric Errors

<2.11.1-1
  • L
Numeric Errors

<2.11-1
  • H
Out-of-Bounds

<2.22-6
  • H
Link Following

<2.11.2-8
  • C
Out-of-Bounds

<2.3.5-3
  • M
Numeric Errors

<2.11-1
  • L
CVE-2025-4802

<2.39-4
  • M
CVE-2002-1146

<2.3
  • H
CVE-2003-0028

<2.3.1-16
  • L
NULL Pointer Dereference

<2.24-9
  • M
Out-of-Bounds

<2.19-12
  • H
Out-of-bounds Write

<2.37-12
  • C
Numeric Errors

<2.2-1
  • L
Arbitrary Code Injection

<2.19-2
  • L
CVE-2021-43396

<2.32-5
  • M
Out-of-bounds Write

<2.22-10
  • M
Code

<2.15-1
  • L
Uncontrolled Recursion

*
  • M
CVE-2004-1382

<2.3.2.ds1-19
  • L
Numeric Errors

<2.13-35
  • M
Improper Data Handling

<2.5-1
  • C
Out-of-bounds Read

<2.28-9
  • L
Resource Management Errors

*
  • H
Use After Free

<2.30-3
  • L
Out-of-Bounds

*
  • M
Out-of-Bounds

<2.15
  • H
Improper Data Handling

<2.28-1
  • L
Numeric Errors

<2.6-2
  • H
Untrusted Search Path

<2.25-6
  • L
Improper Data Handling

<2.28-1
  • L
Access Restriction Bypass

<2.21-1
  • M
Numeric Errors

<2.17-93
  • C
Out-of-Bounds

<2.21-7
  • M
Code

<2.19-1
  • L
Out-of-Bounds

<2.18-1
  • H
CVE-2003-0689

<2.2.5
  • L
Access Restriction Bypass

<2.19-14
  • L
Numeric Errors

<2.17-94
  • H
Resource Management Errors

<2.22-4
  • H
Improper Input Validation

<2.11-1
  • M
Out-of-Bounds

<2.17-94
  • H
Integer Overflow or Wraparound

<2.21-1
  • L
CVE-2010-4051

<2.19-4
  • M
CVE-2004-0968

<2.3.2.ds1-19
  • C
CVE-2002-0391

<2.2.5-13
  • L
CVE-2004-1453

<2.3.5