Vulnerabilities > GNU > Glibc

DATE CVE VULNERABILITY TITLE RISK
2018-02-01 CVE-2018-6485 Integer Overflow or Wraparound vulnerability in multiple products
An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
network
low complexity
gnu redhat oracle netapp CWE-190
critical
9.8
2018-02-01 CVE-2017-1000409 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Glibc 2.5
A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable.
local
high complexity
gnu CWE-119
7.0
2018-02-01 CVE-2017-1000408 Missing Release of Resource after Effective Lifetime vulnerability in GNU Glibc 2.1.1
A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable.
local
low complexity
gnu CWE-772
7.8
2018-01-31 CVE-2018-1000001 Out-of-bounds Write vulnerability in multiple products
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
local
low complexity
gnu canonical redhat CWE-787
7.8
2017-12-18 CVE-2017-16997 Untrusted Search Path vulnerability in multiple products
elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions.
local
low complexity
gnu redhat CWE-426
7.8
2017-12-05 CVE-2017-17426 Integer Overflow or Wraparound vulnerability in GNU Glibc 2.26
The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow.
network
high complexity
gnu CWE-190
8.1
2017-10-22 CVE-2017-15804 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Glibc
The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
network
low complexity
gnu CWE-119
critical
9.8
2017-10-20 CVE-2017-15671 Missing Release of Resource after Effective Lifetime vulnerability in GNU Glibc
The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
network
high complexity
gnu CWE-772
5.9
2017-10-20 CVE-2017-15670 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Glibc
The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.
network
low complexity
gnu CWE-119
critical
9.8
2017-10-18 CVE-2011-5320 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Glibc
scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.
local
low complexity
gnu CWE-119
6.2