- glibc_2.27-0ubuntu2 ()
- 2.27-3ubuntu1.6
- 2025-02-25 14:00:07
- CVE CVE-2018-11236, CVSSv2 Score: 7.8
- Description:
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution
- Patch: glibc/2.27/CVE-2018-11236.patch
- CVE CVE-2018-19591, CVSSv2 Score: 5.3
- Description:
In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function
- Patch: glibc/2.27/CVE-2018-19591.patch
- CVE CVE-2019-9169, CVSSv2 Score: 6.5
- Description:
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
- Patch: glibc/2.27/CVE-2019-9169.patch
- CVE CVE-2020-10029, CVSSv2 Score: 5.7
- Description:
A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability.
- Patch: glibc/2.27/CVE-2020-10029-1.patch
- CVE CVE-2020-10029, CVSSv2 Score: 5.7
- Description:
A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability.
- Patch: glibc/2.27/CVE-2020-10029-2.patch
- CVE CVE-2020-1752, CVSSv2 Score: 7.0
- Description:
Fix use-after-free in glob when expanding ~user
- Patch: glibc/2.27/CVE-2020-1752.patch
- CVE CVE-2019-19126, CVSSv2 Score: 2.9
- Description:
https://access.redhat.com/security/cve/CVE-2019-19126
- Patch: glibc/2.27/CVE-2019-19126.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
- Patch: glibc/2.27/CVE-2016-10228-pre1.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
- Patch: glibc/2.27/CVE-2016-10228-1.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
- Patch: glibc/2.27/CVE-2016-10228-2.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.27/CVE-2016-10228-adapt.patch
- CVE CVE-2019-25013, CVSSv2 Score: 4.8
- Description:
Buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding
- Patch: glibc/2.27/CVE-2019-25013.patch
- CVE CVE-2020-27618, CVSSv2 Score: 9.1
- Description:
An integer overflow flaw was found in glibc that may result in reading of arbitrary memory when wordexp is used with a specially crafted untrusted regular expression input.
- Patch: glibc/2.27/CVE-2020-27618.patch
- CVE CVE-2020-29562, CVSSv2 Score: 4.8
- Description:
Assertion failure in iconv when converting invalid UCS4
- Patch: glibc/2.27/CVE-2020-29562.patch
- CVE CVE-2021-3326, CVSSv2 Score: 5.9
- Description:
Assertion failure in ISO-2022-JP-3 gconv module related to combining characters
- Patch: glibc/2.27/CVE-2021-3326.patch
- CVE CVE-2021-35942, CVSSv2 Score: 9.1
- Description:
An integer overflow flaw was found in glibc that may result in reading of arbitrary memory when wordexp is used with a specially crafted untrusted regular expression input.
- Patch: glibc/2.27/CVE-2021-35942.patch
- CVE CVE-2021-3999, CVSSv2 Score: 7.4
- Description:
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system
- Patch: glibc/2.27/CVE-2021-3999.patch
- CVE CVE-2022-23218, CVSSv2 Score: 7.0
- Description:
A stack based buffer-overflow vulnerability was found in the deprecated compatibility function svcunix_create() in the sunrpc's svc_unix.c module of the GNU C Library (aka glibc) through 2.34. This vulnerability copies its path argument onto the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) then it will lead to arbitrary code execution.
- Patch: glibc/2.27/CVE-2022-23218-pre1.patch
- CVE CVE-2022-23218, CVSSv2 Score: 7.0
- Description:
A stack based buffer-overflow vulnerability was found in the deprecated compatibility function svcunix_create() in the sunrpc's svc_unix.c module of the GNU C Library (aka glibc) through 2.34. This vulnerability copies its path argument onto the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) then it will lead to arbitrary code execution.
- Patch: glibc/2.27/CVE-2022-23218.patch
- CVE CVE-2022-23219, CVSSv2 Score: 7.0
- Description:
A stack based buffer-overflow vulnerability was found in the deprecated compatibility function clnt_create() in the sunrpc's clnt_gen.c module of the GNU C Library (aka glibc) through 2.34. This vulnerability copies its hostname argument onto the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) lead to arbitrary code execution.
- Patch: glibc/2.27/CVE-2022-23219.patch
- CVE CVE-2023-4806, CVSSv2 Score: 5.9
- Description:
A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
- Patch: glibc/2.27/CVE-2023-4806.patch
- CVE CVE-2023-4813, CVSSv2 Score: 5.9
- Description:
A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
- Patch: glibc/2.27/CVE-2023-4813.patch
- CVE CVE-2025-0395, CVSSv2 Score: 5.5
- Description:
When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
- Patch: glibc/2.35/CVE-2025-0395.patch