Количество 26
Количество 26
ELSA-2025-11140
ELSA-2025-11140: glib2 security update (MODERATE)
ELSA-2025-10855
ELSA-2025-10855: glib2 security update (MODERATE)

RLSA-2025:11327
Moderate: glib2 security update
ELSA-2025-11327
ELSA-2025-11327: glib2 security update (MODERATE)

CVE-2025-4373
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

CVE-2025-4373
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

CVE-2025-4373
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
CVE-2025-4373
A flaw was found in GLib, which is vulnerable to an integer overflow i ...

CVE-2024-52533
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.

CVE-2024-52533
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.

CVE-2024-52533
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.

CVE-2024-52533
CVE-2024-52533
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one erro ...

SUSE-SU-2025:02233-1
Security update for glib2
GHSA-cfv9-2rgf-f55c
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

BDU:2025-07137
Уязвимость функции g_string_insert_unichar() файла glib/gstring.c библиотеки Glib, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2024:4254-1
Security update for glib2

SUSE-SU-2024:4078-1
Security update for glib2

SUSE-SU-2024:4051-2
Security update for glib2

SUSE-SU-2024:4051-1
Security update for glib2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2025-11140 ELSA-2025-11140: glib2 security update (MODERATE) | 28 дней назад | |||
ELSA-2025-10855 ELSA-2025-10855: glib2 security update (MODERATE) | 27 дней назад | |||
![]() | RLSA-2025:11327 Moderate: glib2 security update | 14 дней назад | ||
ELSA-2025-11327 ELSA-2025-11327: glib2 security update (MODERATE) | 27 дней назад | |||
![]() | CVE-2025-4373 A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite. | CVSS3: 4.8 | 0% Низкий | 3 месяца назад |
![]() | CVE-2025-4373 A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite. | CVSS3: 4.8 | 0% Низкий | 3 месяца назад |
![]() | CVE-2025-4373 A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite. | CVSS3: 4.8 | 0% Низкий | 3 месяца назад |
CVE-2025-4373 A flaw was found in GLib, which is vulnerable to an integer overflow i ... | CVSS3: 4.8 | 0% Низкий | 3 месяца назад | |
![]() | CVE-2024-52533 gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character. | CVSS3: 9.8 | 1% Низкий | 9 месяцев назад |
![]() | CVE-2024-52533 gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character. | CVSS3: 7 | 1% Низкий | 9 месяцев назад |
![]() | CVE-2024-52533 gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character. | CVSS3: 9.8 | 1% Низкий | 9 месяцев назад |
![]() | CVSS3: 9.8 | 1% Низкий | 9 месяцев назад | |
CVE-2024-52533 gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one erro ... | CVSS3: 9.8 | 1% Низкий | 9 месяцев назад | |
![]() | SUSE-SU-2025:02233-1 Security update for glib2 | 0% Низкий | около 1 месяца назад | |
GHSA-cfv9-2rgf-f55c A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite. | CVSS3: 4.8 | 0% Низкий | 3 месяца назад | |
![]() | BDU:2025-07137 Уязвимость функции g_string_insert_unichar() файла glib/gstring.c библиотеки Glib, позволяющая нарушителю выполнить произвольный код | CVSS3: 4.8 | 0% Низкий | 3 месяца назад |
![]() | SUSE-SU-2024:4254-1 Security update for glib2 | 1% Низкий | 8 месяцев назад | |
![]() | SUSE-SU-2024:4078-1 Security update for glib2 | 1% Низкий | 9 месяцев назад | |
![]() | SUSE-SU-2024:4051-2 Security update for glib2 | 1% Низкий | 8 месяцев назад | |
![]() | SUSE-SU-2024:4051-1 Security update for glib2 | 1% Низкий | 8 месяцев назад |
Уязвимостей на страницу