VYPR

rpm package

suse/glib2&distro=SUSE Linux Enterprise Module for Basesystem 15 SP6

pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6

Vulnerabilities (6)

  • CVE-2025-7039LowSep 3, 2025
    affected < 2.78.6-150600.4.22.1fixed 2.78.6-150600.4.22.1

    A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local

  • CVE-2025-6052LowJun 13, 2025
    affected < 2.78.6-150600.4.16.1fixed 2.78.6-150600.4.16.1

    A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, d

  • CVE-2025-4373MedMay 6, 2025
    affected < 2.78.6-150600.4.16.1fixed 2.78.6-150600.4.16.1

    A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

  • CVE-2025-3360LowApr 7, 2025
    affected < 2.78.6-150600.4.11.1fixed 2.78.6-150600.4.11.1

    A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.

  • CVE-2024-52533Nov 11, 2024
    affected < 2.78.6-150600.4.8.1fixed 2.78.6-150600.4.8.1

    gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.

  • CVE-2024-34397MedMay 7, 2024
    affected < 2.78.6-150600.4.3.1fixed 2.78.6-150600.4.3.1

    An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals tha