Vulnerabilities > GNU > Glibc > Critical

DATE CVE VULNERABILITY TITLE RISK
2018-02-02 CVE-2018-6551 Integer Overflow or Wraparound vulnerability in GNU Glibc 2.24/2.25/2.26
The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.
network
low complexity
gnu CWE-190
critical
9.8
2017-12-18 CVE-2017-16997 Untrusted Search Path vulnerability in multiple products
elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions.
network
gnu redhat CWE-426
critical
9.3
2017-10-22 CVE-2017-15804 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Glibc
The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
network
low complexity
gnu CWE-119
critical
9.8
2017-06-12 CVE-2014-9984 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Glibc
nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.
network
low complexity
gnu CWE-119
critical
9.8