Browse all 77 CVE security advisories affecting GNU. AI-powered Chinese analysis, POCs, and references for each vulnerability.
GNU provides a comprehensive collection of free software essential for operating system functionality, primarily serving as the foundational userland for Linux distributions. Its core use case involves delivering command-line utilities, development tools, and system libraries that enable software compilation and execution. Historically, vulnerabilities within the GNU ecosystem have frequently involved buffer overflows and integer overflows, often leading to remote code execution or denial of service conditions. While cross-site scripting is less relevant to its command-line nature, privilege escalation risks have emerged in specific components like coreutils and grep when handling malformed input. Notable security incidents have included critical flaws in GnuPG and Bash, highlighting the importance of rigorous input validation. With seventy-seven recorded CVEs, the project maintains a steady patch cycle, emphasizing stability and security through open-source collaboration and continuous code review processes.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-32772 | GNU Inetutils 安全漏洞 — inetutilsCWE-669 | 3.4 | Low | 2026-03-13 |
| CVE-2026-32746 | GNU Inetutils 安全漏洞 — inetutilsCWE-120 | 9.8 | Critical | 2026-03-13 |
| CVE-2026-28372 | GNU Inetutils 安全漏洞 — inetutilsCWE-829 | 7.4 | High | 2026-02-27 |
| CVE-2026-24061 | GNU Inetutils 参数注入漏洞 — InetutilsCWE-88 | 9.8 | Critical | 2026-01-21 |
This page lists every published CVE security advisory associated with GNU. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.