Debian Glib2.0 vulnerabilities
44 known vulnerabilities affecting debian/glib2.0.
Total CVEs
44
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH3MEDIUM15LOW23
Vulnerabilities
Page 2 of 3
CVE-2021-27218HIGHCVSS 7.5fixed in glib2.0 2.66.7-1 (bookworm)2021
CVE-2021-27218 [HIGH] CVE-2021-27218: glib2.0 - An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If...
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
Scope: local
bookworm: resolved (fixed in 2.66.7-1)
bullseye: resolved (fixed in 2.66.7-1)
forky: resolved (fixed in 2.
debian
CVE-2021-3800MEDIUMCVSS 5.5fixed in glib2.0 2.64.0-1 (bookworm)2021
CVE-2021-3800 [MEDIUM] CVE-2021-3800: glib2.0 - A flaw was found in glib before version 2.63.6. Due to random charset alias, pke...
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
Scope: local
bookworm: resolved (fixed in 2.64.0-1)
bullseye: resolved (fixed in 2.64.0-1)
forky: resolved (fixed in 2.64.0-1)
sid: resolved (fixed in 2.64.0-1)
trixie: resolved (fix
debian
CVE-2021-28153MEDIUMCVSS 5.3fixed in glib2.0 2.66.7-2 (bookworm)2021
CVE-2021-28153 [MEDIUM] CVE-2021-28153: glib2.0 - An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is us...
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file tha
debian
CVE-2020-6750MEDIUMCVSS 5.9fixed in glib2.0 2.62.5-1 (bookworm)2020
CVE-2020-6750 [MEDIUM] CVE-2020-6750: glib2.0 - GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to ...
GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically depending on network delays. The greatest security relevance is in use cases where a proxy is used
debian
CVE-2020-35457LOWCVSS 7.8fixed in glib2.0 2.66.0-1 (bookworm)2020
CVE-2020-35457 [HIGH] CVE-2020-35457: glib2.0 - GNOME GLib before 2.65.3 has an integer overflow, that might lead to an out-of-b...
GNOME GLib before 2.65.3 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries. NOTE: the vendor's position is "Realistically this is not a security issue. The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()." The researcher states that t
debian
CVE-2019-13012CRITICALCVSS 9.8fixed in glib2.0 2.60.5-1 (bookworm)2019
CVE-2019-13012 [CRITICAL] CVE-2019-13012: glib2.0 - The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates d...
The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permi
debian
CVE-2019-12450CRITICALCVSS 9.8fixed in glib2.0 2.58.3-2 (bookworm)2019
CVE-2019-12450 [CRITICAL] CVE-2019-12450: glib2.0 - file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not p...
file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
Scope: local
bookworm: resolved (fixed in 2.58.3-2)
bullseye: resolved (fixed in 2.58.3-2)
forky: resolved (fixed in 2.58.3-2)
sid: resolved (fixed in 2.58.3-2)
trixie: res
debian
CVE-2019-25085MEDIUMCVSS 6.3fixed in epiphany-browser 3.34.1-1 (bookworm)2019
CVE-2019-25085 [MEDIUM] CVE-2019-25085: epiphany-browser - A vulnerability was found in GNOME gvdb. It has been classified as critical. Thi...
A vulnerability was found in GNOME gvdb. It has been classified as critical. This affects the function gvdb_table_write_contents_async of the file gvdb-builder.c. The manipulation leads to use after free. It is possible to initiate the attack remotely. The name of the patch is d83587b2a364eb9a9a53be7e6a708074e252de14. It is recommended to apply a patch to
debian
CVE-2019-9633LOWCVSS 6.52019
CVE-2019-9633 [MEDIUM] CVE-2019-9633: glib2.0 - gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask rem...
gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrated by GNOME Web (aka Epiphany).
Scope: local
book
debian
CVE-2018-16429LOWCVSS 7.5fixed in glib2.0 2.58.0-1 (bookworm)2018
CVE-2018-16429 [HIGH] CVE-2018-16429: glib2.0 - GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_cont...
GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
Scope: local
bookworm: resolved (fixed in 2.58.0-1)
bullseye: resolved (fixed in 2.58.0-1)
forky: resolved (fixed in 2.58.0-1)
sid: resolved (fixed in 2.58.0-1)
trixie: resolved (fixed in 2.58.0-1)
debian
CVE-2018-16428LOWCVSS 9.8fixed in glib2.0 2.58.0-1 (bookworm)2018
CVE-2018-16428 [CRITICAL] CVE-2018-16428: glib2.0 - In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL...
In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.
Scope: local
bookworm: resolved (fixed in 2.58.0-1)
bullseye: resolved (fixed in 2.58.0-1)
forky: resolved (fixed in 2.58.0-1)
sid: resolved (fixed in 2.58.0-1)
trixie: resolved (fixed in 2.58.0-1)
debian
CVE-2012-3524MEDIUMCVSS 6.9PoCfixed in dbus 1.6.8-1 (bookworm)2012
CVE-2012-3524 [MEDIUM] CVE-2012-3524: dbus - libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X...
libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus
debian
CVE-2012-0039LOWCVSS 7.52012
CVE-2012-0039 [HIGH] CVE-2012-0039: glib2.0 - GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash val...
GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence
debian
CVE-2009-3289LOWCVSS 7.8fixed in glib2.0 2.22.0-1 (bookworm)2009
CVE-2009-3289 [HIGH] CVE-2009-3289: glib2.0 - The g_file_copy function in glib 2.0 sets the permissions of a target file to th...
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
Scope: local
bookworm: resolved (fixed in 2.22.0-1)
bullseye: resolved (fixed in 2.22.0-1)
debian
CVE-2008-4316MEDIUMCVSS 4.6fixed in glib2.0 2.20.0-1 (bookworm)2008
CVE-2008-4316 [MEDIUM] CVE-2008-4316: glib2.0 - Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-d...
Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
Scope: local
bookworm: resolved (fixed in 2.20.0-1)
bullseye: resolved (fixed in 2.20.0-1)
forky: resolved (fixed in 2.20.0-1)
sid: resolved (fixed in 2.20.
debian
CVE-2007-1660LOWCVSS 6.8fixed in glib2.0 2.14.3-1 (bookworm)2007
CVE-2007-1660 [MEDIUM] CVE-2007-1660: glib2.0 - Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly c...
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
Scope: local
bookworm: resolved (fixed in 2.14.3-1)
bullseye: resolved (f
debian
CVE-2007-1662LOWCVSS 5.0fixed in glib2.0 2.14.3-1 (bookworm)2007
CVE-2007-1662 [MEDIUM] CVE-2007-1662: glib2.0 - Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end ...
Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent attackers to cause a denial of service (crash), possibly involving forward references.
Scope: local
bookworm: resolved (fixed in 2.14.3-1)
bullseye: resolved (fixed in 2.14.3-1)
forky: res
debian
CVE-2007-4766LOWCVSS 7.5fixed in glib2.0 2.14.3-1 (bookworm)2007
CVE-2007-4766 [HIGH] CVE-2007-4766: glib2.0 - Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library ...
Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library before 7.3 allow context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.
Scope: local
bookworm: resolved (fixed in 2.14.3-1)
bullseye: resolved (fixed in 2.14.3-1)
forky: resolved (fixed in 2.14.3-1)
sid: reso
debian
CVE-2007-4768LOWCVSS 6.8fixed in glib2.0 2.14.3-1 (bookworm)2007
CVE-2007-4768 [MEDIUM] CVE-2007-4768: glib2.0 - Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library ...
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
Scope: local
bookworm: resolved (fixed in 2.14.3-1)
bullseye: resolved (fixed in 2.14.3-1)
forky: resolved (fi
debian
CVE-2007-4767LOWCVSS 5.0fixed in glib2.0 2.14.3-1 (bookworm)2007
CVE-2007-4767 [MEDIUM] CVE-2007-4767: glib2.0 - Perl-Compatible Regular Expression (PCRE) library before 7.3 does not properly c...
Perl-Compatible Regular Expression (PCRE) library before 7.3 does not properly compute the length of (1) a \p sequence, (2) a \P sequence, or (3) a \P{x} sequence, which allows context-dependent attackers to cause a denial of service (infinite loop or crash) or execute arbitrary code.
Scope: local
bookworm: resolved (fixed in 2.14.3-1)
bullseye: resolved (fixed in 2
debian