Integer Overflow or Wraparound Affecting glib2 package, versions <0:2.36.3-5.27.amzn1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN201803-GLIB2-6616008
- published 17 Apr 2024
- disclosed 14 Dec 2020
How to fix?
Upgrade Amazon-Linux:2018.03
glib2
to version 0:2.36.3-5.27.amzn1 or higher.
This issue was patched in ALAS-2024-1929
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2
package and not the glib2
package as distributed by Amazon-Linux
.
See How to fix?
for Amazon-Linux:2018.03
relevant fixed versions and status.
GNOME GLib before 2.65.3 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries. NOTE: the vendor's position is "Realistically this is not a security issue. The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()." The researcher states that this pattern is undocumented