Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-27218

Опубликовано: 15 фев. 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib2.0fixed2.66.7-1package
glib2.0fixed2.58.3-2+deb10u3busterpackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942

  • Test case depends on CVE-2021-27219 fix

EPSS

Процентиль: 86%
0.03013
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
redhat
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
nvd
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

rocky
почти 4 года назад

Moderate: glib2 security update

EPSS

Процентиль: 86%
0.03013
Низкий