Описание
A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | bootc | Fix deferred | ||
Red Hat Enterprise Linux 10 | glib2 | Fix deferred | ||
Red Hat Enterprise Linux 10 | glycin-loaders | Fix deferred | ||
Red Hat Enterprise Linux 10 | loupe | Fix deferred | ||
Red Hat Enterprise Linux 10 | mingw-glib2 | Fix deferred | ||
Red Hat Enterprise Linux 10 | rpm-ostree | Fix deferred | ||
Red Hat Enterprise Linux 6 | glib2 | Under investigation | ||
Red Hat Enterprise Linux 7 | glib2 | Under investigation | ||
Red Hat Enterprise Linux 8 | glib2 | Under investigation | ||
Red Hat Enterprise Linux 8 | librsvg2 | Under investigation |
Показывать по
Дополнительная информация
Статус:
3.7 Low
CVSS3
Связанные уязвимости
A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()
A flaw was found in glib. An integer overflow during temporary file cr ...
3.7 Low
CVSS3