Описание
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 6 | glib2 | Out of support scope | ||
Red Hat Enterprise Linux 6 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 7 | glib2 | Out of support scope | ||
Red Hat Enterprise Linux 9 | glib2 | Not affected | ||
Red Hat Enterprise Linux 9 | mingw-glib2 | Not affected | ||
Red Hat Enterprise Linux 8 | mingw-glib2 | Fixed | RHSA-2021:4526 | 09.11.2021 |
Red Hat Enterprise Linux 8 | glib2 | Fixed | RHSA-2021:3058 | 10.08.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before ...
EPSS
7.5 High
CVSS3