Gnu Glibc vulnerabilities

154 known vulnerabilities affecting gnu/glibc.

Total CVEs
154
CISA KEV
1
actively exploited
Public exploits
23
Exploited in wild
1
Severity breakdown
CRITICAL21HIGH58MEDIUM66LOW9

Vulnerabilities

Page 1 of 8
CVE-2026-4046HIGHCVSS 7.5≤ 2.432026-03-30
CVE-2026-4046 [HIGH] CWE-617 CVE-2026-4046: The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion fa The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application. This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need t
nvd
CVE-2026-4437HIGHCVSS 7.5≥ 2.34, ≤ 2.432026-03-20
CVE-2026-4437 [HIGH] CWE-125 CVE-2026-4437: Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library' Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as
nvd
CVE-2026-4438MEDIUMCVSS 5.4≥ 2.34, ≤ 2.432026-03-20
CVE-2026-4438 [MEDIUM] CWE-20 CVE-2026-4438: Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library' Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.
nvd
CVE-2026-3904MEDIUMCVSS 6.2≥ 2.35, < 2.372026-03-11
CVE-2026-3904 [MEDIUM] CWE-366 CVE-2026-3904: Calling NSS-backed functions that support caching via nscd may call the nscd client side code and i Calling NSS-backed functions that support caching via nscd may call the nscd client side code and in the GNU C Library version 2.36 under high load on x86_64 systems, the client may call memcmp on inputs that are concurrently modified by other processes or threads and crash. The nscd client in the GNU C Library uses the memcmp function with inputs t
nvd
CVE-2025-15281HIGHCVSS 7.5≥ 2.0, < 2.432026-01-20
CVE-2025-15281 [HIGH] CWE-908 CVE-2025-15281: Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.
nvd
CVE-2026-0915HIGHCVSS 7.5≥ 2.0, ≤ 2.422026-01-15
CVE-2026-0915 [HIGH] CWE-908 CVE-2026-0915: Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
nvd
CVE-2026-0861HIGHCVSS 8.4≥ 2.30, ≤ 2.422026-01-14
CVE-2026-0861 [HIGH] CWE-190 CVE-2026-0861: Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign fun
nvd
CVE-2025-5702MEDIUMCVSS 5.6≥ 2.39, < 2.39-209≥ 2.40, < 2.40-139+1 more2025-06-05
CVE-2025-5702 [MEDIUM] CWE-665 CVE-2025-5702: The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the call
nvd
CVE-2025-5745MEDIUMCVSS 5.6≥ 2.40, < 2.40-136≥ 2.41, < 2.41-572025-06-05
CVE-2025-5745 [MEDIUM] CWE-665 CVE-2025-5745: The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the ca
nvd
CVE-2025-4802HIGHCVSS 7.8≥ 2.27, ≤ 2.382025-05-16
CVE-2025-4802 [HIGH] CWE-426 CVE-2025-4802: Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2. Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
nvd
CVE-2024-33602HIGHCVSS 7.4≥ 2.15, < 2.402024-05-06
CVE-2024-33602 [HIGH] CWE-466 CVE-2024-33602: nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (n nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
nvd
CVE-2024-33601HIGHCVSS 7.3≥ 2.15, < 2.402024-05-06
CVE-2024-33601 [HIGH] CWE-617 CVE-2024-33601: nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemo nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients. The flaw was introduced in glibc 2.15 when the cache was added to nscd.
nvd
CVE-2024-33599HIGHCVSS 8.1≥ 2.15, < 2.402024-05-06
CVE-2024-33599 [HIGH] CWE-121 CVE-2024-33599: nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in t
nvd
CVE-2024-33600MEDIUMCVSS 5.9≥ 2.15, < 2.402024-05-06
CVE-2024-33600 [MEDIUM] CWE-476 CVE-2024-33600: nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
nvd
CVE-2024-2961HIGHCVSS 7.3PoC≥ 2.1.93, < 2.402024-04-17
CVE-2024-2961 [HIGH] CWE-787 CVE-2024-2961: The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer pas The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
nvd
CVE-2023-6779HIGHCVSS 7.5≥ 2.37, < 2.392024-01-31
CVE-2023-6779 [HIGH] CWE-122 CVE-2023-6779: An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc l An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an a
nvd
CVE-2023-6246HIGHCVSS 7.8PoC≥ 2.36, < 2.392024-01-31
CVE-2023-6246 [HIGH] CWE-122 CVE-2023-6246: A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an a
nvd
CVE-2023-6780MEDIUMCVSS 5.3≥ 2.37, < 2.392024-01-31
CVE-2023-6780 [MEDIUM] CWE-131 CVE-2023-6780: An integer overflow was found in the __vsyslog_internal function of the glibc library. This function An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects
nvd
CVE-2023-4911HIGHCVSS 7.8KEVPoC≥ 2.34, < 2.392023-10-03
CVE-2023-4911 [HIGH] CWE-122 CVE-2023-4911: A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GL A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
nvd
CVE-2023-5156HIGHCVSS 7.5≥ 2.34, < 2.392023-09-25
CVE-2023-5156 [HIGH] CVE-2023-5156: A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.
nvd