Gnu Glibc vulnerabilities

154 known vulnerabilities affecting gnu/glibc.

Total CVEs
154
CISA KEV
1
actively exploited
Public exploits
23
Exploited in wild
1
Severity breakdown
CRITICAL21HIGH58MEDIUM66LOW9

Vulnerabilities

Page 4 of 8
CVE-2018-6551CRITICALCVSS 9.8≥ 2.24, ≤ 2.262018-02-02
CVE-2018-6551 [CRITICAL] CWE-190 CVE-2018-6551: The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on po The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.
nvd
CVE-2018-6485CRITICALCVSS 9.8≤ 2.262018-02-01
CVE-2018-6485 [CRITICAL] CWE-190 CVE-2018-6485: An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C L An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
nvd
CVE-2017-1000409HIGHCVSS 7.0PoCv2.52018-02-01
CVE-2017-1000409 [HIGH] CVE-2017-1000409: A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_ A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
nvd
CVE-2017-1000408HIGHCVSS 7.8PoCv2.1.12018-02-01
CVE-2017-1000408 [HIGH] CVE-2017-1000408: A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_ A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
nvd
CVE-2018-1000001HIGHCVSS 7.8PoC≤ 2.262018-01-31
CVE-2018-1000001 [HIGH] CWE-787 CVE-2018-1000001: In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be use In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
nvd
CVE-2017-16997HIGHCVSS 7.8v2.19v2.20+5 more2017-12-18
CVE-2017-16997 [HIGH] CWE-426 CVE-2017-16997: elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPA elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated
nvd
CVE-2017-17426HIGHCVSS 8.1v2.262017-12-05
CVE-2017-17426 [HIGH] CWE-190 CVE-2017-17426: The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow
nvd
CVE-2017-15804CRITICALCVSS 9.8≤ 2.262017-10-22
CVE-2017-15804 [CRITICAL] CWE-119 CVE-2017-15804: The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
nvd
CVE-2017-15670CRITICALCVSS 9.8≤ 2.262017-10-20
CVE-2017-15670 [CRITICAL] CWE-119 CVE-2017-15670: The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-ba The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.
nvd
CVE-2017-15671MEDIUMCVSS 5.9≤ 2.262017-10-20
CVE-2017-15671 [MEDIUM] CWE-772 CVE-2017-15671: The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
nvd
CVE-2011-5320MEDIUMCVSS 6.2≤ 2.14.12017-10-18
CVE-2011-5320 [MEDIUM] CWE-119 CVE-2011-5320: scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (seg scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.
nvd
CVE-2017-12133MEDIUMCVSS 5.9≤ 2.252017-09-07
CVE-2017-12133 [MEDIUM] CWE-416 CVE-2017-12133: Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.
nvd
CVE-2017-12132MEDIUMCVSS 5.9≤ 2.252017-08-01
CVE-2017-12132 [MEDIUM] CWE-770 CVE-2017-12132: The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS suppo The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
nvd
CVE-2015-5180HIGHCVSS 7.5≤ 2.242017-06-27
CVE-2015-5180 [HIGH] CWE-476 CVE-2015-5180: res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NU res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).
nvd
CVE-2017-1000366HIGHCVSS 7.8PoC≤ 2.252017-06-19
CVE-2017-1000366 [HIGH] CWE-119 CVE-2017-1000366: glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate th glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploita
nvd
CVE-2014-9984CRITICALCVSS 9.8≤ 2.192017-06-12
CVE-2014-9984 [CRITICAL] CWE-119 CVE-2014-9984: nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the si nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.
nvd
CVE-2017-8804HIGHCVSS 7.5v2.252017-05-07
CVE-2017-8804 [HIGH] CVE-2017-8804: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle fail The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. NOTE: [Infor
nvd
CVE-2015-8983HIGHCVSS 8.1≤ 2.212017-03-20
CVE-2015-8983 [HIGH] CWE-190 CVE-2015-8983: Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glib Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.
nvd
CVE-2015-8985MEDIUMCVSS 5.9fixed in 2.282017-03-20
CVE-2015-8985 [MEDIUM] CWE-19 CVE-2015-8985: The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attac The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.
nvd
CVE-2015-8984MEDIUMCVSS 5.9≤ 2.212017-03-20
CVE-2015-8984 [MEDIUM] CWE-125 CVE-2015-8984: The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-depen The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash) via a malformed pattern, which triggers an out-of-bounds read.
nvd