First published: Mon Dec 14 2020(Updated: )
** DISPUTED ** GNOME GLib before 2.65.3 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries. NOTE: the vendor's position is "Realistically this is not a security issue. The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()." The researcher states that this pattern is undocumented.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME GLib | <2.65.3 | |
<2.65.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this GNOME GLib issue is CVE-2020-35457.
The severity level of CVE-2020-35457 is high with a CVSS score of 7.8.
The affected software of CVE-2020-35457 is GNOME GLib versions prior to 2.65.3.
CVE-2020-35457 is an integer overflow vulnerability in GNOME GLib that might lead to an out-of-bounds write in g_option_group_add_entries.
Yes, the fix for CVE-2020-35457 is available in version 2.65.3 of GNOME GLib.