A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
2.72.4-0ubuntu2.72.80.0-6ubuntu3.62.40.2-0ubuntu1.1+esm72.48.2-0ubuntu4.8+esm52.56.4-0ubuntu0.18.04.9+esm52.64.6-1~ubuntu20.04.9+esm1Exploitability
AV:NAC:HPR:NUI:NScope
S:UImpact
C:NI:LA:NCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N