glibc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://ftp.gnu.org|glibc package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Incorrect Calculation of Buffer Size

[0,)
  • M
Improper Check or Handling of Exceptional Conditions

[0,)
  • M
Improper Check or Handling of Exceptional Conditions

[0,)
  • H
Stack-based Buffer Overflow

[0,)
  • M
NULL Pointer Dereference

[0,)
  • H
Out-of-bounds Write

[,2.32)
  • M
Integer Overflow or Wraparound

[2.37,2.39)
  • H
Heap-based Buffer Overflow

[2.37,2.39)
  • H
Heap-based Buffer Overflow

[2.37,2.39)
  • H
Heap-based Buffer Overflow

[2.34,2.39)
  • H
Denial of Service (DoS)

[,2.39)
  • M
Use After Free

[,2.36)
  • M
Use After Free

[,2.36)
  • M
Information Exposure

[0,)
  • M
Use After Free

[0,)
  • M
Denial of Service (DoS)

[,2.22)
  • M
Buffer Overflow

[0,)
  • M
Out-of-bounds Write

[0,)
  • H
Buffer Overflow

[,2.29)
  • M
Out-of-bounds Read

[0,)
  • M
Out-of-bounds Read

[2.33,2.33-4)
  • M
Off-by-one Error

[,2.33-4)
  • H
Denial of Service (DoS)

[0,)
  • L
Improper Initialization

[0,2.31)
  • M
Remote Code Execution (RCE)

[,2.13)
  • H
Untrusted Search Path

[0,2.25.1)
  • M
Denial of Service (DoS)

[,2.3.2]
  • H
Out-of-Bounds

[,2.24)
  • M
Out-of-Bounds

[,2.17]
  • H
Integer Overflow or Wraparound

[,2.26]
  • M
Denial of Service (DoS)

[,2.14]
  • H
Denial of Service (DoS)

[,2.20)
  • H
Arbitrary Code Execution

[,2.1.1]
  • H
Arbitrary Code Execution

[2.1,2.3.2]
  • H
Integer Underflow

[,2.32)
  • H
NULL Pointer Dereference

[,2.25)
  • M
Out-of-Bounds

[,2.19)
  • C
Out-of-Bounds

[,2.23)
  • H
Out-of-Bounds

[,2.21)
  • M
Access Restriction Bypass

[,2.18)
  • M
Denial of Service (DoS)

[,2.19)
  • M
Out-of-Bounds

[,2.20)
  • M
Denial of Service (DoS)

[,2.26)
  • H
Out-of-Bounds

[,2.27)
  • C
Use After Free

[,2.34)
  • M
Out-of-Bounds

[,2.21)
  • H
Memory Leak

[,2.1.1]
  • C
Integer Overflow or Wraparound

[,2.32)
  • H
Out-of-Bounds

[0,2.27)
  • M
Out-of-bounds Write

[,2.24)
  • H
Symlink Attack

[,2.11.3)
  • M
Denial of Service (DoS)

[,2.14]
  • C
Out-of-Bounds

[,2.3.5)
  • M
Cross-site Scripting (XSS)

[,2.14)
  • M
Denial of Service (DoS)

[,2.14.1)
  • H
Access Restriction Bypass

[,2.2)
  • C
Out-of-bounds Write

[2.0,2.18)
  • C
Out-of-bounds Write

[,2.27)
  • H
Buffer Overflow

[0,)
  • M
Improper Input Validation

[,2.16)
  • H
NULL Pointer Dereference

[0,2.34)
  • H
Denial of Service (DoS)

[,2.19)
  • M
Denial of Service (DoS)

[2.30,2.33)
  • H
Out-of-bounds Write

[,2.31)
  • M
Information Exposure

[,2.26)
  • M
Denial of Service (DoS)

[,2.3)
  • M
Code

[,2.20)
  • H
Deserialization of Untrusted Data

[,2.25]
  • M
Denial of Service (DoS)

[0,)
  • M
Access Restriction Bypass

[,2.14)
  • M
Resource Management Errors

[,2.14.1)
  • M
Denial of Service (DoS)

[2.0.1,2.11.1]
  • H
Buffer Overflow

[,2.30)
  • M
Improper Input Validation

[,2.32)
  • C
Out-of-Bounds

[,2.20)
  • H
Denial of Service (DoS)

[,2.33)
  • M
Directory Traversal

[,2.20)
  • H
Improper Access Control

[,2.25)
  • H
Resource Management Errors

[,2.24)
  • M
Return of Wrong Status Code

[,2.30)
  • M
Improper Input Validation

[,2.29)
  • C
Out-of-Bounds

[,2.23)
  • M
Denial of Service (DoS)

[2.0,2.3]
  • M
Denial of Service (DoS)

[,2.10.1)
  • H
Insufficiently Protected Credentials

[2.7,2.10.2]
  • M
Resource Management Errors

[0,)
  • M
Information Exposure

[,2.3.2)[2.3.3.0,2.3.3.200)[2.3.4.0,2.3.4.200)
  • H
Access Restriction Bypass

[,2.13)
  • M
Out-of-bounds Read

[,2.33)
  • H
Denial of Service (DoS)

[,2.29)
  • M
Out-of-Bounds

[,2.15)
  • M
Memory Leak

[,2.27)
  • C
Denial of Service (DoS)

[,2.23)
  • M
Security Features

[,2.23)
  • H
Integer Overflow or Wraparound

[,2.22)
  • M
Out-of-Bounds

[,2.18)
  • H
Out-of-bounds Write

[,2.28)
  • M
Out-of-Bounds

[,2.19)
  • H
Improper Input Validation

[,2.29)
  • H
Out-of-Bounds

[,2.24)
  • H
Access Restriction Bypass

[,2.19)
  • M
Out-of-bounds Write

[,2.32.0)
  • H
Improper Input Validation

[,2.23)
  • M
Denial of Service (DoS)

[,2.33)
  • H
Out-of-Bounds

[,2.20)
  • M
Out-of-Bounds

[,2.22)
  • H
Resource Management Errors

[,2.21)
  • C
Out-of-Bounds

[,2.27)
  • C
Out-of-Bounds

[,2.23)
  • H
Out-of-bounds Write

[,2.27)
  • L
Double Free

[2.29,2.34)
  • M
Out-of-Bounds

[,2.19)
  • C
Out-of-bounds Write

[,2.28)
  • H
Improper Data Handling

[,2.28)
  • M
Code

[,2.15)
  • M
Resource Management Errors

[,2.12.2)
  • M
Improper Input Validation

[,2.21]
  • H
Out-of-Bounds

[,2.23)
  • M
Access Restriction Bypass

[2.5,2.12]
  • H
Authentication Bypass

[2.0,2.1.3]
  • M
Resource Management Errors

[1.00,2.12.2]
  • H
Out-of-bounds Write

[,2.23)
  • M
CVE-2004-0968

[2.0,2.3.10]
  • M
Arbitrary Code Execution

[2.0,2.3.10]
  • M
Improper Input Validation

[,2.19)
  • C
Out-of-Bounds

[2.21,2.28)
  • M
Code

[,2.22)
  • H
Arbitrary Code Execution

[,2.3)
  • H
Access Restriction Bypass

[,2.11.3)
  • H
Use After Free

[,2.32.0)
  • H
Improper Input Validation

[,2.11.2)
  • M
Improper Data Handling

[,2.28)
  • M
Denial of Service (DoS)

[,2.11)
  • M
Denial of Service (DoS)

[,2.14)
  • C
Unchecked Return Value

[,2.2)
  • M
Use After Free

[,2.26)
  • M
Out-of-bounds Read

[,2.22)
  • H
Out-of-bounds Read

[,2.30)
  • C
Out-of-Bounds

[,2.27)
  • H
Remote Code Execution (RCE)

[,2.20)
  • M
Denial of Service (DoS)

[0,)
  • H
Integer Overflow or Wraparound

[,2.22)
  • C
Out-of-bounds Write

[2.24,2.27)
  • M
Improper Data Handling

[,2.5)