glibc-common

Direct Vulnerabilities

Known vulnerabilities in the glibc-common package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Reachable Assertion

*
  • L
Inappropriate Encoding for Output Context

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Use of Uninitialized Resource

<0:2.28-251.el8_10.31
  • M
Use of Uninitialized Resource

<0:2.28-251.el8_10.31
  • M
Double Free

<0:2.28-251.el8_10.25
  • M
Untrusted Search Path

<0:2.28-251.el8_10.22
  • M
Incorrect Calculation of Buffer Size

<0:2.28-251.el8_10.16
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-101.el8_2.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-101.el8_2.2
  • H
NULL Pointer Dereference

<0:2.28-101.el8_2.2
  • H
Out-of-Bounds

<0:2.28-101.el8_2.2
  • H
Out-of-bounds Write

<0:2.28-101.el8_2.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
NULL Pointer Dereference

<0:2.28-151.el8_4.2
  • H
Out-of-Bounds

<0:2.28-151.el8_4.2
  • H
Out-of-bounds Write

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
NULL Pointer Dereference

<0:2.28-151.el8_4.2
  • H
Out-of-Bounds

<0:2.28-151.el8_4.2
  • H
Out-of-bounds Write

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
NULL Pointer Dereference

<0:2.28-225.el8_8.11
  • H
Out-of-Bounds

<0:2.28-225.el8_8.11
  • H
Out-of-bounds Write

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
NULL Pointer Dereference

<0:2.28-225.el8_8.11
  • H
Out-of-Bounds

<0:2.28-225.el8_8.11
  • H
Out-of-bounds Write

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
NULL Pointer Dereference

<0:2.28-225.el8_8.11
  • H
Out-of-Bounds

<0:2.28-225.el8_8.11
  • H
Out-of-bounds Write

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-225.el8_8.11
  • H
NULL Pointer Dereference

<0:2.28-225.el8_8.11
  • H
Out-of-Bounds

<0:2.28-225.el8_8.11
  • H
Out-of-bounds Write

<0:2.28-225.el8_8.11
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-151.el8_4.2
  • H
NULL Pointer Dereference

<0:2.28-151.el8_4.2
  • H
Out-of-Bounds

<0:2.28-151.el8_4.2
  • H
Out-of-bounds Write

<0:2.28-151.el8_4.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
NULL Pointer Dereference

<0:2.28-189.10.el8_6
  • H
Out-of-Bounds

<0:2.28-189.10.el8_6
  • H
Out-of-bounds Write

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
NULL Pointer Dereference

<0:2.28-189.10.el8_6
  • H
Out-of-Bounds

<0:2.28-189.10.el8_6
  • H
Out-of-bounds Write

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
NULL Pointer Dereference

<0:2.28-189.10.el8_6
  • H
Out-of-Bounds

<0:2.28-189.10.el8_6
  • H
Out-of-bounds Write

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-189.10.el8_6
  • H
NULL Pointer Dereference

<0:2.28-189.10.el8_6
  • H
Out-of-Bounds

<0:2.28-189.10.el8_6
  • H
Out-of-bounds Write

<0:2.28-189.10.el8_6
  • H
Out-of-Bounds

<0:2.28-251.el8_10.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-251.el8_10.2
  • H
Improper Check or Handling of Exceptional Conditions

<0:2.28-251.el8_10.2
  • H
NULL Pointer Dereference

<0:2.28-251.el8_10.2
  • H
Out-of-bounds Write

<0:2.28-236.el8_9.13
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • M
Use After Free

<0:2.28-189.8.el8_6
  • H
Heap-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Heap-based Buffer Overflow

<0:2.28-189.6.el8_6
  • H
Heap-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Heap-based Buffer Overflow

<0:2.28-189.6.el8_6
  • H
Heap-based Buffer Overflow

<0:2.28-189.6.el8_6
  • H
Heap-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Heap-based Buffer Overflow

<0:2.28-189.6.el8_6
  • H
Heap-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Heap-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Stack-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Stack-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Stack-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Stack-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Stack-based Buffer Overflow

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • H
Use After Free

<0:2.28-225.el8_8.6
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Off-by-one Error

<0:2.28-164.el8_5.3
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Out-of-bounds Write

<0:2.28-127.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Reachable Assertion

<0:2.28-151.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Stack-based Buffer Overflow

<0:2.28-127.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Out-of-Bounds

<0:2.28-151.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • M
Use After Free

<0:2.28-127.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • L
Improper Input Validation

<0:2.28-101.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Out-of-bounds Read

<0:2.28-151.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Integer Overflow or Wraparound

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Use After Free

<0:2.28-164.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Improper Input Validation

<0:2.28-72.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.28-151.el8