Direct Vulnerabilities

Known vulnerabilities in the https://ftp.gnu.org|glibc package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Reachable Assertion

[0,)
  • M
Inappropriate Encoding for Output Context

[,2.44)
  • H
Out-of-bounds Read

[2.43,2.44)
  • M
Race Condition within a Thread

[2.35,2.37)
  • M
Use of Uninitialized Resource

[2.0,2.43)
  • L
Use of Uninitialized Resource

[2.0,2.43)
  • M
Integer Overflow or Wraparound

[2.30,2.43)
  • M
Double Free

[2.4,2.42)
  • H
Compiler Removal of Code to Clear Buffers

[2.40,2.42)
  • H
Compiler Removal of Code to Clear Buffers

[2.39,2.39-209)[2.40,2.40-139)[2.41,2.41-60)
  • H
Untrusted Search Path

[2.27,2.39)
  • H
Integer Overflow or Wraparound

[,2.82.5)
  • H
Incorrect Calculation of Buffer Size

[,2.41)
  • M
Improper Check or Handling of Exceptional Conditions

[,2.40)
  • M
Improper Check or Handling of Exceptional Conditions

[,2.40)
  • H
Stack-based Buffer Overflow

[,2.40)
  • M
NULL Pointer Dereference

[,2.40)
  • H
Out-of-bounds Write

[,2.40)
  • M
Integer Overflow or Wraparound

[2.37,2.39)
  • H
Heap-based Buffer Overflow

[2.37,2.39)
  • H
Heap-based Buffer Overflow

[2.36,2.39)
  • H
Heap-based Buffer Overflow

[2.34,2.39)
  • H
Denial of Service (DoS)

[,2.39)
  • M
Use After Free

[,2.36)
  • M
Use After Free

[,2.36)
  • M
Information Exposure

[,2.39)
  • M
Use After Free

[,2.39)
  • M
Denial of Service (DoS)

[,2.22)
  • M
Buffer Overflow

[,2.38)
  • M
Out-of-bounds Write

[2.37,2.38)
  • H
Buffer Overflow

[,2.29)
  • M
Out-of-bounds Read

[,2.37)
  • M
Out-of-bounds Read

[2.33,2.35)
  • M
Off-by-one Error

[,2.35)
  • H
Denial of Service (DoS)

[0,)
  • L
Improper Initialization

[0,2.31)
  • M
Remote Code Execution (RCE)

[,2.13)
  • H
Untrusted Search Path

[0,2.25.1)
  • M
Denial of Service (DoS)

[,2.3.2)
  • H
Out-of-Bounds

[,2.24)
  • M
Out-of-Bounds

[,2.18)
  • H
Integer Overflow or Wraparound

[2.26,2.27)
  • M
Buffer Access with Incorrect Length Value

[,2.15)
  • H
Denial of Service (DoS)

[,2.20)
  • H
Arbitrary Code Execution

[,2.1.3)
  • H
Arbitrary Code Execution

[2.1,2.3.2)
  • M
Out-of-Bounds

[,2.20)
  • M
Out-of-Bounds

[,2.21)
  • H
Out-of-Bounds

[,2.21)
  • M
Denial of Service (DoS)

[,2.19)
  • H
Out-of-Bounds

[,2.27)
  • H
NULL Pointer Dereference

[,2.25)
  • C
Use After Free

[,2.34)
  • H
Integer Underflow

[,2.32)
  • M
Out-of-Bounds

[,2.19)
  • M
Denial of Service (DoS)

[,2.26)
  • M
Access Restriction Bypass

[,2.18)
  • C
Out-of-Bounds

[,2.23)
  • H
Memory Leak

[,2.27)
  • C
Integer Overflow or Wraparound

[,2.34)
  • H
Out-of-Bounds

[0,2.27)
  • M
Out-of-bounds Write

[,2.24)
  • H
Symlink Attack

[,2.11.3)
  • M
Integer Overflow or Wraparound

[,2.16)
  • C
Out-of-Bounds

[,2.3.5)
  • M
Cross-site Scripting (XSS)

[,2.14)
  • M
Denial of Service (DoS)

[,2.14.1)
  • H
Access Restriction Bypass

[,2.2)
  • C
Out-of-bounds Write

[2.0,2.18)
  • H
Denial of Service (DoS)

[,2.19)
  • M
Improper Input Validation

[,2.16)
  • H
Buffer Overflow

[0,)
  • M
Denial of Service (DoS)

[2.30,2.33)
  • H
NULL Pointer Dereference

[0,2.34)
  • C
Out-of-bounds Write

[,2.27)
  • H
Out-of-bounds Write

[,2.31)
  • M
Information Exposure

[,2.26)
  • M
Denial of Service (DoS)

[,2.3)
  • M
Code

[,2.20)
  • M
Access Restriction Bypass

[,2.14)
  • M
Resource Management Errors

[,2.14.1)
  • M
Integer Overflow or Wraparound

[2.0.1,2.12)
  • H
Denial of Service (DoS)

[,2.33)
  • C
Out-of-Bounds

[,2.20)
  • C
Out-of-Bounds

[,2.23)
  • M
Improper Input Validation

[,2.29)
  • M
Return of Wrong Status Code

[,2.30)
  • M
Directory Traversal

[,2.20)
  • M
Improper Input Validation

[,2.32)
  • H
Improper Access Control

[,2.25)
  • H
Resource Management Errors

[,2.24)
  • H
Buffer Overflow

[,2.30)
  • M
Denial of Service (DoS)

[2.0,2.3]
  • M
Denial of Service (DoS)

[,2.10.1)
  • H
Unprotected Transport of Credentials

[2.7,2.11.2)
  • M
Information Exposure

[,2.3.2)[2.3.3.0,2.3.3.200)[2.3.4.0,2.3.4.200)
  • H
Access Restriction Bypass

[,2.13)
  • C
Denial of Service (DoS)

[,2.23)
  • M
Out-of-Bounds

[,2.19)
  • H
Improper Input Validation

[,2.29)
  • H
Out-of-bounds Write

[,2.28)
  • H
Access Restriction Bypass

[,2.19)
  • H
Out-of-Bounds

[,2.24)
  • M
Out-of-bounds Read

[,2.33)
  • H
Denial of Service (DoS)

[,2.29)
  • M
Memory Leak

[,2.27)
  • M
Out-of-Bounds

[,2.15)
  • H
Integer Overflow or Wraparound

[,2.22)
  • M
Security Features

[,2.23)
  • M
Out-of-Bounds

[,2.18)
  • M
Out-of-bounds Write

[,2.32.0)
  • H
Improper Input Validation

[,2.23)
  • H
Out-of-Bounds

[,2.20)
  • L
Double Free

[2.29,2.34)
  • C
Out-of-bounds Write

[,2.28)
  • H
Resource Management Errors

[,2.21)
  • M
Out-of-Bounds

[,2.22)
  • C
Out-of-Bounds

[,2.23)
  • H
Out-of-bounds Write

[,2.27)
  • M
Denial of Service (DoS)

[,2.33)
  • C
Out-of-Bounds

[,2.27)
  • M
Out-of-Bounds

[,2.19)
  • H
Improper Data Handling

[,2.28)
  • M
Code

[,2.15)
  • M
Resource Management Errors

[,2.12.2)
  • M
Improper Input Validation

[,2.21)
  • H
Out-of-Bounds

[,2.23)
  • M
Improper Handling of Extra Parameters

[2.5,2.13)
  • H
Authentication Bypass

[2.0,2.1.3]
  • M
Resource Management Errors

[1.00,2.12.2]
  • H
Out-of-bounds Write

[,2.23)
  • M
Improper Link Resolution Before File Access

[2.0,2.3.4)
  • M
Arbitrary Code Execution

[2.0,2.3.10]
  • M
Code

[,2.22)
  • C
Out-of-Bounds

[2.21,2.28)
  • M
Improper Input Validation

[,2.19)
  • H
Arbitrary Code Execution

[,2.3)
  • H
Access Restriction Bypass

[,2.11.3)
  • H
Use After Free

[,2.32.0)
  • H
Improper Input Validation

[,2.11.2)
  • M
Improper Data Handling

[,2.28)
  • M
Denial of Service (DoS)

[,2.11)
  • M
Denial of Service (DoS)

[,2.14)
  • C
Unchecked Return Value

[,2.2)
  • C
Out-of-bounds Write

[2.24,2.27)
  • H
Remote Code Execution (RCE)

[,2.20)
  • M
Denial of Service (DoS)

[,2.11.3)
  • H
Integer Overflow or Wraparound

[,2.22)
  • M
Use After Free

[,2.26)
  • M
Out-of-bounds Read

[,2.22)
  • H
Out-of-bounds Read

[,2.30)
  • C
Out-of-Bounds

[,2.27)
  • M
Improper Data Handling

[,2.5)