|
CVE-2009-5155
|
An off-by-one error in the strfmon_l function in the GNU C Library (glibc) allows context-dependent attackers to cause a denial
of service (crash) or possibly execute arbitrary code via a large precision value.
|
|
CVE-2010-0015
|
The NIS+ implementation in the GNU C Library (glibc) allows remote attackers to cause a denial of service (crash) or possibly
execute arbitrary code via a crafted NIS+ directory name that triggers a buffer overflow.
|
|
CVE-2011-5320
|
The tar implementation in BusyBox before 1.20.0 allows remote attackers to create or overwrite arbitrary files via a directory
traversal attack in a tar header.
|
|
CVE-2012-4412
|
An integer overflow in the strcoll function in the GNU C Library (glibc) allows context-dependent attackers to cause a denial
of service (crash) or possibly execute arbitrary code via a long string.
|
|
CVE-2012-4424
|
A stack-based buffer overflow in the strcoll function in the GNU C Library (glibc) allows context-dependent attackers to cause
a denial of service (crash) or possibly execute arbitrary code via a long string.
|
|
CVE-2013-4237
|
The read dir_r function in the GNU C Library (glibc) does not properly handle certain directory entries, which allows context-dependent
attackers to cause a denial of service (out-of-bounds read and crash).
|
|
CVE-2013-4458
|
A stack-based buffer overflow in the getaddrinfo function in the GNU C Library (glibc) allows remote attackers to cause a
denial of service (crash) via a large number of AF_INET6 addresses.
|
|
CVE-2013-4788
|
The PTR_MANGLE implementation in the GNU C Library (glibc) does not properly initialize the guard value, which allows local
attackers to bypass the pointer-guarding protection mechanism.
|
|
CVE-2014-4043
|
The posix_spawn_file_actions_addopen function in the GNU C Library (glibc) before 2.20 does not copy its path argument, which
allows context-dependent attackers to trigger a use-after-free vulnerability.
|
|
CVE-2014-6040
|
An out-of-bounds read in the iconv function in the GNU C Library (glibc) allows context-dependent attackers to cause a denial
of service (crash) via a crafted multibyte sequence.
|
|
CVE-2014-7817
|
The wordexp function in the GNU C Library (glibc) allows context-dependent attackers to execute arbitrary commands via a crafted
string that triggers command substitution even when WRDE_NOCMD is specified.
|
|
CVE-2014-8121
|
The nss_files implementation in the GNU C Library (glibc) does not properly handle certain database files, which allows local
attackers to cause a denial of service (infinite loop) or corrupt the database.
|
|
CVE-2014-9402
|
The getnetbyname function in the GNU C Library (glibc) allows remote attackers to cause a denial of service (infinite loop)
via a crafted DNS response.
|
|
CVE-2014-9761
|
A stack-based buffer overflow in the nan function in the GNU C Library (glibc) allows context-dependent attackers to cause
a denial of service (crash) via a long string.
|
|
CVE-2015-1781
|
A buffer overflow in the gethostbyname_r function in the GNU C Library (glibc) allows context-dependent attackers to cause
a denial of service (crash) or possibly execute arbitrary code via a long host name.
|
|
CVE-2015-5180
|
A NULL pointer dereference in the res_query function in the GNU C Library (glibc) allows remote attackers to cause a denial
of service (crash) via a crafted DNS response.
|
|
CVE-2015-8776
|
An out-of-bounds access in the strftime function in the GNU C Library (glibc) allows context-dependent attackers to cause
a denial of service (crash) via a crafted format string.
|
|
CVE-2015-8777
|
The LD_POINTER_GUARD environment variable in the GNU C Library (glibc) allows local attackers to bypass the pointer-guarding
protection mechanism by disabling it.
|
|
CVE-2015-8778
|
An integer overflow in the hcreate function in the GNU C Library (glibc) allows context-dependent attackers to cause a denial
of service (crash) or possibly execute arbitrary code via a large number of elements.
|
|
CVE-2015-8779
|
A stack-based buffer overflow in the catopen function in the GNU C Library (glibc) allows context-dependent attackers to cause
a denial of service (crash) or possibly execute arbitrary code via a long catalog name.
|
|
CVE-2015-8982
|
A buffer overflow in the strftime function in the GNU C Library (glibc) allows context-dependent attackers to cause a denial
of service (crash) via a crafted format string.
|
|
CVE-2015-8983
|
An integer overflow in the _IO_wstr_overflow function in the GNU C Library (glibc) allows context-dependent attackers to cause
a denial of service (crash) or possibly execute arbitrary code via a large string.
|
|
CVE-2015-8984
|
An out-of-bounds read in the fnmatch function in the GNU C Library (glibc) allows context-dependent attackers to cause a denial
of service (crash) via a crafted pattern.
|
|
CVE-2015-8985
|
The pop_fail_stack function in the GNU C Library (glibc) allows context-dependent attackers to cause a denial of service (assertion
failure and crash) via vectors related to extended regular expression processing.
|
|
CVE-2016-10228
|
An out-of-bounds write in the iconv function in the GNU C Library (glibc) allows context-dependent attackers to cause a denial
of service (crash) or possibly execute arbitrary code via a crafted multibyte sequence.
|
|
CVE-2016-10739
|
A buffer overflow in the getaddrinfo function in the GNU C Library (glibc) allows remote attackers to cause a denial of service
(crash) via a large number of AF_INET6 addresses.
|
|
CVE-2016-1234
|
A stack-based buffer overflow in the glob function in the GNU C Library (glibc) allows context-dependent attackers to cause
a denial of service (crash) or possibly execute arbitrary code via a long path.
|
|
CVE-2016-3075
|
A stack-based buffer overflow in the getnetbyname function in the GNU C Library (glibc) allows remote attackers to cause a
denial of service (crash) via a crafted DNS response.
|
|
CVE-2016-3706
|
A stack-based buffer overflow in the getaddrinfo function in the GNU C Library (glibc) allows remote attackers to cause a
denial of service (crash) via vectors involving hostent conversion, due to an incomplete fix for CVE-2013-4458.
|
|
CVE-2016-4429
|
A stack-based buffer overflow in the clntudp_call function in the GNU C Library (glibc) allows remote attackers to cause a
denial of service (crash) via a crafted RPC response.
|
|
CVE-2017-12132
|
The DNS stub resolver in the GNU C Library (glibc) before 2.26 will solicit largeUDP responses when EDNS support is enabled,
potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
|
|
CVE-2017-15670
|
An off-by-one error in the glob function in the GNU C Library (glibc) before 2.27leads to a heap-based buffer overflow when
processing home directories using the ~ operator followed by a long string.
|
|
CVE-2017-15671
|
The glob function in the GNU C Library (glibc) before 2.27 could skip freeing allocated memory when processing the ~ operator
with a long username, potentially leading to a denial of service (memory leak).
|
|
CVE-2017-16997
|
The elf/dl-load.c implementation in the GNU C Library (glibc) does not properly handle certain checks, which allows local
attackers to bypass security restrictions via a crafted shared object.
|
|
CVE-2017-8804
|
The memmove and memcpy implementations in the GNU C Library (glibc) for x86_64 do not properly handle overlapping memory regions
in certain cases, which allows context-dependent attackers to cause a denial of service (crash) or possibly have other unspecified
impact.
|
|
CVE-2018-1000001
|
A buffer underflow in the realpath function in the GNU C Library (glibc) allows local attackers to cause a denial of service
(crash) or possibly execute arbitrary code via a crafted path.
|
|
CVE-2018-11236
|
An integer overflow in the __vfprintf_internal function in the GNU C Library (glibc) allows context-dependent attackers to
cause a denial of service (crash) or possibly execute arbitrary code via a large precision value.
|
|
CVE-2018-6485
|
An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (glibc) 2.26 and
earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
|
|
CVE-2019-1010023
|
A buffer overflow in the ld.so dynamic loader in the GNU C Library (glibc) allows local attackers to cause a denial of service
(crash) or possibly execute arbitrary code via a crafted environment variable.
|
|
CVE-2019-19126
|
The GNU C Library (glibc) before 2.31 does not properly handle the LD_PRELOAD environment variable for SUID binaries, which
allows local attackers to bypass security restrictions.
|
|
CVE-2019-25013
|
A buffer overflow in the iconv function in the GNU C Library (glibc) when converting to the EUC-KR character set allows context-dependent
attackers to cause a denial of service (crash) or possibly execute arbitrary code.
|
|
CVE-2019-9169
|
A heap-based buffer overflow in the regexec function in the GNU C Library (glibc) allows context-dependent attackers to cause
a denial of service (crash) or possibly execute arbitrary code via a crafted regular expression.
|
|
CVE-2020-10029
|
A stack-based buffer overflow in the cosl function in the GNU C Library (glibc) allows context-dependent attackers to cause
a denial of service (crash) or possibly execute arbitrary code via a large input value.
|
|
CVE-2020-1751
|
A stack-based buffer overflow in the _dl_open function in the GNU C Library (glibc) allows local attackers to cause a denial
of service (crash) or possibly execute arbitrary code via a crafted shared object path.
|
|
CVE-2020-1752
|
A use-after-free vulnerability in the glob function in the GNU C Library (glibc) allows context-dependent attackers to cause
a denial of service (crash) or possibly execute arbitrary code via a crafted path.
|
|
CVE-2020-27618
|
A buffer overflow in the iconv function in the GNU C Library (glibc) when converting to the IBM1364 character set allows context-dependent
attackers to cause a denial of service (crash) or possibly execute arbitrary code.
|
|
CVE-2020-29573
|
A buffer overflow in the printf function in the GNU C Library (glibc) allows context-dependent attackers to cause a denial
of service (crash) via a large precision value.
|
|
CVE-2021-27645
|
A double-free vulnerability in the nscd (name service cache daemon) in the GNU C Library (glibc) allows local attackers to
cause a denial of service (crash) or possibly execute arbitrary code.
|
|
CVE-2021-3326
|
A buffer overflow in the iconv function in the GNU C Library (glibc) when converting to the ISO-2022-JP-3 character set allows
context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code.
|
|
CVE-2021-33574
|
A use-after-free vulnerability in the mq_notify function in the GNU C Library (glibc) allows context-dependent attackers to
cause a denial of service (crash) or possibly execute arbitrary code.
|
|
CVE-2021-35942
|
A buffer overflow in the wordexp function in the GNU C Library (glibc) allows context-dependent attackers to cause a denial
of service (crash) via a long string.
|
|
CVE-2021-3999
|
A buffer overflow in the getcwd function in the GNU C Library (glibc) allows local attackers to cause a denial of service
(crash) or possibly execute arbitrary code via a long path.
|
|
CVE-2022-23218
|
A stack-based buffer overflow in the svcunix_create function in the GNU C Library (glibc) allows remote attackers to cause
a denial of service (crash) via a crafted RPC request.
|
|
CVE-2022-23219
|
A stack-based buffer overflow in the clnt_create function in the GNU C Library (glibc) allows remote attackers to cause a
denial of service (crash) via a crafted RPC request.
|
|
CVE-2023-4527
|
A stack-based buffer overflow in the getaddrinfo function in the GNU C Library (glibc) allows remote attackers to cause a
denial of service (crash) via a large DNS response received over TCP.
|
|
CVE-2023-4806
|
A use-after-free vulnerability in the getaddrinfo function in the GNU C Library (glibc) allows remote attackers to cause a
denial of service (crash) via a crafted DNS response.
|
|
CVE-2023-4813
|
A use-after-free vulnerability in the getaddrinfo function in the GNU C Library (glibc) allows remote attackers to cause a
denial of service (crash) via a crafted DNS response.
|
|
CVE-2023-4911
|
A buffer overflow in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable allows
a local attacker to execute arbitrary code with elevated privileges.
|
|
CVE-2023-5156
|
A memory leak in the getaddrinfo function in the GNU C Library (glibc) allows remote attackers to cause a denial of service
(memory exhaustion) via a crafted DNS response.
|
|
CVE-2024-2961
|
A buffer overflow in the iconv function in the GNU C Library (glibc) when converting to the ISO-2022-CN-EXT character set
allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code.
|
|
CVE-2024-33599
|
A buffer overflow in the nscd (name service cache daemon) in the GNU C Library (glibc) allows local attackers to cause a denial
of service (crash) or possibly execute arbitrary code.
|
|
CVE-2024-33600
|
A NULL pointer dereference in the nscd (name service cache daemon) in the GNU C Library (glibc) allows local attackers to
cause a denial of service (crash) via a crafted request.
|
|
CVE-2024-33601
|
A buffer overflow in the nscd (name service cache daemon) in the GNU C Library (glibc) allows local attackers to cause a denial
of service (crash) or possibly execute arbitrary code.
|
|
CVE-2024-33602
|
CVE-2024-33602A buffer overflow in the nscd (name service cache daemon) in the GNU C Library (glibc) allows local attackers
to cause a denial of service (crash) or possibly execute arbitrary code.
|
|
CVE-2025-0395
|
A buffer overflow in the assert() function in the GNU C Library (glibc) versions 2.13 to 2.40 occurs because insufficient
space is allocated for the failure message, potentially leading to a denial of service.
|
|
CVE-2025-4802
|
A vulnerability in the GNU C Library (glibc) versions 2.27 to 2.38 allows a local attacker to load malicious shared libraries
and escalate privileges via an untrusted LD_LIBRARY_PATH in statically compiled setuid binaries that call dlopen.
|
|
CVE-2025-5702
|
A vulnerability in the optimized strcmp implementation for Power10 processors in the GNU C Library (glibc) version 2.39 and
later improperly initializes vector registers, potentially leading to data corruption or altered control flow.
|
|
CVE-2025-8058
|
A double-free vulnerability in the regcomp function in the GNU C Library (glibc) versions 2.4 to 2.41 occurs during bracket
expression parsing when a memory allocation failure takes place, potentially allowing arbitrary code execution.
|