Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-7039

Опубликовано: 03 сент. 2025
Источник: debian
EPSS Низкий

Описание

A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib2.0fixed2.84.4-1package
glib2.0fixed2.84.4-3~deb13u1trixiepackage
glib2.0fixed2.74.6-2+deb12u7bookwormpackage
glib2.0postponedbullseyepackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib/-/issues/3716

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4674

  • Fixed by: https://gitlab.gnome.org/GNOME/glib/-/commit/61e963284889ddb4544e6f1d5261c16120f6fcc3 (2.85.2)

EPSS

Процентиль: 26%
0.00089
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
около 1 месяца назад

A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.

CVSS3: 3.7
redhat
4 месяца назад

A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.

CVSS3: 3.7
nvd
около 1 месяца назад

A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.

CVSS3: 3.7
msrc
около 1 месяца назад

Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()

EPSS

Процентиль: 26%
0.00089
Низкий