Lucene search

K
f5F5F5:K18407453
HistoryApr 25, 2022 - 12:00 a.m.

K18407453 : Glib vulnerabilities CVE-2018-10767, CVE-2019-12450, and CVE-2019-19126

2022-04-2500:00:00
my.f5.com
45
glib
vulnerabilities
buffer over-read
file permissions
security advisory

AI Score

7.2

Confidence

Low

EPSS

0.015

Percentile

87.1%

Security Advisory Description

There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.

file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.

Impact

There is no impact; F5 products are not affected by this vulnerability.