Integer Overflow or Wraparound Affecting glib2.0 package, versions *
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-GLIB20-1051691
- published 16 Dec 2020
- disclosed 14 Dec 2020
Introduced: 14 Dec 2020
CVE-2020-35457 Open this link in a new tabHow to fix?
There is no fixed version for Debian:10
glib2.0
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0
package and not the glib2.0
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
GNOME GLib before 2.65.3 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries. NOTE: the vendor's position is "Realistically this is not a security issue. The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()." The researcher states that this pattern is undocumented