glib2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the glib2 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Off-by-one Error

*
  • M
Improper Verification of Source of a Communication Channel

*
  • M
CVE-2022-32816

<0:2.56.4-159.el8
  • M
CVE-2022-32816

<0:2.56.4-159.el8
  • M
CVE-2022-32816

<0:2.56.4-159.el8
  • M
CVE-2022-32816

<0:2.56.4-159.el8
  • M
CVE-2022-32816

<0:2.56.4-159.el8
  • M
Out-of-bounds Write

<0:2.56.4-159.el8
  • M
Out-of-bounds Write

<0:2.56.4-159.el8
  • M
Out-of-bounds Write

<0:2.56.4-159.el8
  • M
Out-of-bounds Write

<0:2.56.4-159.el8
  • M
Out-of-bounds Write

<0:2.56.4-159.el8
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Buffer Overflow

<0:2.56.4-159.el8
  • M
Buffer Overflow

<0:2.56.4-159.el8
  • M
Buffer Overflow

<0:2.56.4-159.el8
  • M
Buffer Overflow

<0:2.56.4-159.el8
  • M
Buffer Overflow

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Information Exposure

<0:2.56.4-159.el8
  • M
Information Exposure

<0:2.56.4-159.el8
  • M
Information Exposure

<0:2.56.4-159.el8
  • M
Information Exposure

<0:2.56.4-159.el8
  • M
Information Exposure

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Improper Use of Validation Framework

<0:2.56.4-159.el8
  • M
Out-of-bounds Write

<0:2.56.4-159.el8
  • M
Out-of-bounds Write

<0:2.56.4-159.el8
  • M
Out-of-bounds Write

<0:2.56.4-159.el8
  • M
Out-of-bounds Write

<0:2.56.4-159.el8
  • M
Out-of-bounds Write

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Use After Free

<0:2.56.4-159.el8
  • M
Buffer Overflow

<0:2.56.4-159.el8
  • M
Buffer Overflow

<0:2.56.4-159.el8
  • M
Buffer Overflow

<0:2.56.4-159.el8
  • M
Buffer Overflow

<0:2.56.4-159.el8
  • M
Buffer Overflow

<0:2.56.4-159.el8
  • M
Information Exposure

<0:2.56.4-156.el8
  • M
Information Exposure

<0:2.56.4-156.el8
  • M
Information Exposure

<0:2.56.4-156.el8
  • M
Information Exposure

<0:2.56.4-156.el8
  • M
Information Exposure

<0:2.56.4-156.el8
  • M
Information Exposure

<0:2.56.4-156.el8
  • M
Information Exposure

<0:2.56.4-156.el8
  • M
Information Exposure

<0:2.56.4-156.el8
  • M
Information Exposure

<0:2.56.4-156.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • H
Integer Overflow or Wraparound

<0:2.56.4-8.el8_1
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-8.el8_2.1
  • H
Integer Overflow or Wraparound

<0:2.56.4-8.el8_1
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-8.el8_2.1
  • H
Integer Overflow or Wraparound

<0:2.56.4-8.el8_2.1
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-8.el8_2.1
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • H
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Out-of-bounds Write

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Improper Input Validation

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Use After Free

<0:2.56.4-9.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Missing Authorization

<0:2.56.4-8.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Files or Directories Accessible to External Parties

<0:2.56.4-7.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.56.4-9.el8
  • M
Link Following

<0:2.56.4-156.el8
  • M
Link Following

<0:2.56.4-156.el8
  • M
Link Following

<0:2.56.4-156.el8
  • M
Link Following

<0:2.56.4-156.el8
  • M
Link Following

<0:2.56.4-156.el8
  • M
Link Following

<0:2.56.4-156.el8
  • M
Link Following

<0:2.56.4-156.el8
  • M
Link Following

<0:2.56.4-156.el8
  • M
Link Following

<0:2.56.4-156.el8
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Integer Overflow or Wraparound

<0:2.56.4-10.el8_4.1
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8
  • M
Not Failing Securely ('Failing Open')

<0:2.56.4-9.el8