VYPR

rpm package

suse/glib2&distro=SUSE Linux Enterprise Micro 5.5

pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Vulnerabilities (9)

  • CVE-2026-0988LowJan 21, 2026
    affected < 2.70.5-150400.3.34.1fixed 2.70.5-150400.3.34.1

    A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passe

  • CVE-2025-14512MedDec 11, 2025
    affected < 2.70.5-150400.3.29.1fixed 2.70.5-150400.3.29.1

    A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.

  • CVE-2025-14087MedDec 10, 2025
    affected < 2.70.5-150400.3.29.1fixed 2.70.5-150400.3.29.1

    A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.

  • CVE-2025-13601HigNov 26, 2025
    affected < 2.70.5-150400.3.29.1fixed 2.70.5-150400.3.29.1

    A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length

  • CVE-2025-7039LowSep 3, 2025
    affected < 2.70.5-150400.3.26.1fixed 2.70.5-150400.3.26.1

    A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local

  • CVE-2025-4373MedMay 6, 2025
    affected < 2.70.5-150400.3.23.1fixed 2.70.5-150400.3.23.1

    A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

  • CVE-2025-3360LowApr 7, 2025
    affected < 2.70.5-150400.3.20.1fixed 2.70.5-150400.3.20.1

    A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.

  • CVE-2024-52533Nov 11, 2024
    affected < 2.70.5-150400.3.17.1fixed 2.70.5-150400.3.17.1

    gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.

  • CVE-2024-34397MedMay 7, 2024
    affected < 2.70.5-150400.3.11.1fixed 2.70.5-150400.3.11.1

    An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals tha