Debian Glib2.0 vulnerabilities

44 known vulnerabilities affecting debian/glib2.0.

Total CVEs
44
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH3MEDIUM15LOW23

Vulnerabilities

Page 3 of 3
CVE-2007-1659LOWCVSS 6.8fixed in glib2.0 2.14.3-1 (bookworm)2007
CVE-2007-1659 [MEDIUM] CVE-2007-1659: glib2.0 - Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-depe... Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes. Scope: local bookworm: resolved (fixed in 2.14.3-1) bullseye: resolved (fixed in 2.14.3-1) forky: resolved (fixed in 2
debian
CVE-2007-1661LOWCVSS 6.4fixed in glib2.0 2.14.3-1 (bookworm)2007
CVE-2007-1661 [MEDIUM] CVE-2007-1661: glib2.0 - Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far ... Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent attackers to obtain sensitive information or cause a denial of service (crash), as demonstrated by the "\X?\d" and "\P{L}?\d" patterns. Scope: local bookworm: resolved (fixed i
debian
CVE-2006-7225LOWCVSS 4.3fixed in glib2.0 2.14.3-1 (bookworm)2006
CVE-2006-7225 [MEDIUM] CVE-2006-7225: glib2.0 - Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-depe... Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence. Scope: local bookworm: resolved (fixed in 2.14.3-1) bullseye: resolved (fixed in 2.14.3-
debian
CVE-2006-7226LOWCVSS 4.3fixed in glib2.0 2.14.3-1 (bookworm)2006
CVE-2006-7226 [MEDIUM] CVE-2006-7226: glib2.0 - Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly c... Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash). Scope: local bookworm: resolved (fixed in 2
debian
Debian Glib2.0 vulnerabilities | cvebase