Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2021-2170

Опубликовано: 02 июн. 2021
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2021-2170: glib2 security and bug fix update (IMPORTANT)

[2.56.4-10]

  • Fix various problems in GMainContext Resolves: #1953553
  • Fix CVE-2021-27219 Resolves: #1960600

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

glib2

2.56.4-10.el8_4

glib2-devel

2.56.4-10.el8_4

glib2-doc

2.56.4-10.el8_4

glib2-fam

2.56.4-10.el8_4

glib2-static

2.56.4-10.el8_4

glib2-tests

2.56.4-10.el8_4

Oracle Linux x86_64

glib2

2.56.4-10.el8_4

glib2-devel

2.56.4-10.el8_4

glib2-doc

2.56.4-10.el8_4

glib2-fam

2.56.4-10.el8_4

glib2-static

2.56.4-10.el8_4

glib2-tests

2.56.4-10.el8_4

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 9.8
redhat
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 7.5
nvd
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before ...