Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-27219

Опубликовано: 15 фев. 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib2.0fixed2.66.6-1package
glib2.0fixed2.58.3-2+deb10u3busterpackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib/-/issues/2319

  • Fix introduces new API 'g_memdup2'

  • Fix backport in 2.66.7 adds 'g_memdup2' for internal use but does not allow fixing reverse-dependencies using vulnerable 'g_memdup'

EPSS

Процентиль: 45%
0.00226
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 9.8
redhat
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 7.5
nvd
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

rocky
почти 4 года назад

Important: glib2 security and bug fix update

EPSS

Процентиль: 45%
0.00226
Низкий