Gnome

Glib

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Veröffentlicht 14.09.2023 20:15:09
  • Zuletzt bearbeitet 21.11.2024 07:57:10

A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 23.08.2022 16:15:09
  • Zuletzt bearbeitet 21.11.2024 06:22:28

A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

Exploit
  • EPSS 0.57%
  • Veröffentlicht 11.03.2021 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:59:11

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which coul...

Exploit
  • EPSS 2.13%
  • Veröffentlicht 15.02.2021 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:37

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corrupti...

  • EPSS 5.21%
  • Veröffentlicht 15.02.2021 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:37

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

Exploit
  • EPSS 0.19%
  • Veröffentlicht 14.12.2020 23:15:12
  • Zuletzt bearbeitet 21.11.2024 05:27:19

GNOME GLib before 2.65.3 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries. NOTE: the vendor's position is "Realistically this is not a security issue. The standard pattern is for callers to provide a s...

Exploit
  • EPSS 0.59%
  • Veröffentlicht 09.01.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:36:07

GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur...

  • EPSS 0.84%
  • Veröffentlicht 28.06.2019 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:01

The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CRE...

  • EPSS 0.94%
  • Veröffentlicht 29.05.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:22:52

file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.

  • EPSS 0.65%
  • Veröffentlicht 08.03.2019 08:29:00
  • Zuletzt bearbeitet 21.11.2024 04:52:00

gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mis...