First published: Mon Nov 11 2024(Updated: )
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME GLib | <2.82.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-2325340 is considered to be high severity due to the potential for a buffer overflow.
To fix REDHAT-BUG-2325340, upgrade GNOME GLib to version 2.82.1 or later.
The consequences of REDHAT-BUG-2325340 include potential exploitation leading to application crashes or arbitrary code execution.
Versions of GNOME GLib prior to 2.82.1 are affected by REDHAT-BUG-2325340.
As of now, there are no publicly known exploits for REDHAT-BUG-2325340, but the vulnerability does pose significant risks if left unpatched.