Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2021-3058

Опубликовано: 11 авг. 2021
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2021-3058: glib2 security update (MODERATE)

[2.56.4-10.1]

  • Fix CVE-2021-27218 Resolves: #1974888

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

glib2

2.56.4-10.el8_4.1

glib2-devel

2.56.4-10.el8_4.1

glib2-doc

2.56.4-10.el8_4.1

glib2-fam

2.56.4-10.el8_4.1

glib2-static

2.56.4-10.el8_4.1

glib2-tests

2.56.4-10.el8_4.1

Oracle Linux x86_64

glib2

2.56.4-10.el8_4.1

glib2-devel

2.56.4-10.el8_4.1

glib2-doc

2.56.4-10.el8_4.1

glib2-fam

2.56.4-10.el8_4.1

glib2-static

2.56.4-10.el8_4.1

glib2-tests

2.56.4-10.el8_4.1

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
redhat
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
nvd
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before ...