Vulnerability identifier: #VU51455
Vulnerability risk: Low
CVSSv3.1:
CVE-ID:
CWE-ID:
CWE-681
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Gnome GLib
Universal components / Libraries /
Libraries used by multiple products
Vendor: Gnome Development Team
Description
The vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to incorrect conversion between numeric types in Gnome Glib. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Gnome GLib: 2.66.0 - 2.67.3
CPE
External links
http://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
http://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
http://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?