4.6
CVSSv2

CVE-2020-35457

Published: 14/12/2020 Updated: 11/04/2024
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

GNOME GLib prior to 2.65.3 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries. NOTE: the vendor's position is "Realistically this is not a security issue. The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()." The researcher states that this pattern is undocumented

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnome glib

Vendor Advisories

GNOME GLib before 2653 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries NOTE: the vendor's position is "Realistically this is not a security issue The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()" The resear ...
GNOME GLib before 2653 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries NOTE: the vendor's position is "Realistically this is not a security issue The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()" The resear ...