Gnome Glib vulnerabilities
26 known vulnerabilities affecting gnome/glib.
Total CVEs
26
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL4HIGH13MEDIUM9
Vulnerabilities
Page 2 of 2
CVE-2019-9633MEDIUMCVSS 6.5v2.59.22019-03-08
CVE-2019-9633 [MEDIUM] CWE-754 CVE-2019-9633: gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during th
gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrated by GNOME Web (aka Epiphany).
nvd
CVE-2018-16428CRITICALCVSS 9.8v2.56.12018-09-04
CVE-2018-16428 [CRITICAL] CWE-476 CVE-2018-16428: In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference
In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.
nvd
CVE-2018-16429HIGHCVSS 7.5v2.56.12018-09-04
CVE-2018-16429 [HIGH] CWE-125 CVE-2018-16429: GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmark
GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
nvd
CVE-2012-0039HIGHCVSS 7.5≤ 2.31.8v1.1.12+255 more2012-01-14
CVE-2012-0039 [HIGH] CWE-310 CVE-2012-0039: GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restrict
GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor
nvd
CVE-2009-3289HIGHCVSS 7.8v2.02009-09-22
CVE-2009-3289 [HIGH] CWE-732 CVE-2009-3289: The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a s
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
nvd
CVE-2008-4316MEDIUMCVSS 4.6≤ 2.16.4v2.2.1+3 more2009-03-14
CVE-2008-4316 [MEDIUM] CWE-189 CVE-2008-4316: Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers t
Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
nvd
← Previous2 / 2