The Gnu C Library Glibc vulnerabilities

17 known vulnerabilities affecting the_gnu_c_library/glibc.

Total CVEs
17
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
HIGH10MEDIUM7

Vulnerabilities

Page 1 of 1
CVE-2026-4046HIGHCVSS 7.5≥ 2.3.3, < *2026-03-30
CVE-2026-4046 [HIGH] CWE-617 CVE-2026-4046: The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion fa The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application. This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need t
cvelistv5nvd
CVE-2026-4437HIGHCVSS 7.5≥ 2.34, ≤ 2.432026-03-20
CVE-2026-4437 [HIGH] CWE-125 CVE-2026-4437: Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library' Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as
cvelistv5nvd
CVE-2026-4438MEDIUMCVSS 5.4≥ 2.34, ≤ 2.432026-03-20
CVE-2026-4438 [MEDIUM] CWE-20 CVE-2026-4438: Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library' Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.
cvelistv5nvd
CVE-2026-3904MEDIUMCVSS 6.2≥ 2.35, < 2.372026-03-11
CVE-2026-3904 [MEDIUM] CWE-366 CVE-2026-3904: Calling NSS-backed functions that support caching via nscd may call the nscd client side code and i Calling NSS-backed functions that support caching via nscd may call the nscd client side code and in the GNU C Library version 2.36 under high load on x86_64 systems, the client may call memcmp on inputs that are concurrently modified by other processes or threads and crash. The nscd client in the GNU C Library uses the memcmp function with inputs t
cvelistv5nvd
CVE-2025-15281HIGHCVSS 7.5≥ 2.0, ≤ 2.422026-01-20
CVE-2025-15281 [HIGH] CWE-908 CVE-2025-15281: Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.
cvelistv5nvd
CVE-2026-0915HIGHCVSS 7.5≥ 2.0, ≤ 2.422026-01-15
CVE-2026-0915 [HIGH] CWE-908 CVE-2026-0915: Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
cvelistv5nvd
CVE-2026-0861HIGHCVSS 8.4≥ 2.30, ≤ 2.422026-01-14
CVE-2026-0861 [HIGH] CWE-190 CVE-2026-0861: Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign fun
cvelistv5nvd
CVE-2025-8058MEDIUMCVSS 5.9≥ 2.4, < 2.422025-07-23
CVE-2025-8058 [MEDIUM] CWE-415 CVE-2025-8058: The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if s The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue aff
cvelistv5nvd
CVE-2025-5745MEDIUMCVSS 5.6v2.402025-06-05
CVE-2025-5745 [MEDIUM] CWE-665 CVE-2025-5745: The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the ca
cvelistv5nvd
CVE-2025-5702MEDIUMCVSS 5.6v2.392025-06-05
CVE-2025-5702 [MEDIUM] CWE-665 CVE-2025-5702: The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the call
cvelistv5nvd
CVE-2025-4802HIGHCVSS 7.8≥ 2.27, < 2.392025-05-16
CVE-2025-4802 [HIGH] CWE-426 CVE-2025-4802: Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2. Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
cvelistv5nvd
CVE-2025-0395MEDIUMCVSS 6.2≥ 2.13, ≤ 2.402025-01-22
CVE-2025-0395 [MEDIUM] CWE-131 CVE-2025-0395: When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate en When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
cvelistv5nvd
CVE-2024-33599HIGHCVSS 8.1≥ 2.15, < 2.402024-05-06
CVE-2024-33599 [HIGH] CWE-121 CVE-2024-33599: nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in t
cvelistv5nvd
CVE-2024-33602HIGHCVSS 7.4≥ 2.15, < 2.402024-05-06
CVE-2024-33602 [HIGH] CWE-466 CVE-2024-33602: nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (n nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
cvelistv5nvd
CVE-2024-33601HIGHCVSS 7.3≥ 2.15, < 2.402024-05-06
CVE-2024-33601 [HIGH] CWE-617 CVE-2024-33601: nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemo nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients. The flaw was introduced in glibc 2.15 when the cache was added to nscd.
cvelistv5nvd
CVE-2024-33600MEDIUMCVSS 5.9≥ 2.15, < 2.402024-05-06
CVE-2024-33600 [MEDIUM] CWE-476 CVE-2024-33600: nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
cvelistv5nvd
CVE-2024-2961HIGHCVSS 7.3PoC≥ 2.1.93, < 2.402024-04-17
CVE-2024-2961 [HIGH] CWE-787 CVE-2024-2961: The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer pas The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
cvelistv5nvd