Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-27219

Опубликовано: 04 фев. 2021
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

An integer wraparound was discovered in glib due to passing a 64 bit sized value to function g_memdup() which accepts a 32 bits number as argument. An attacker may abuse this flaw when an application linked against the glib library uses g_bytes_new() function or possibly other functions that use g_memdup() underneath and accept a 64 bits argument as size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

Applications that just use GBytes to access the data are affected by this flaw but the highest threat is to data confidentiality and/or the application availability, due to possible out-of-bounds reads. However, if the data in GBytes is taken through functions such as g_bytes_unref_to_data or g_bytes_unref_to_array it might be possible to have out-of-bounds writes due to the wrongly reported size of the buffer. Applications that use g_memdup to duplicate memory with user-controlled sizes should pay extra attention to the fact that g_memdup accepts a guint size instead of gsize. Thus directly passing a gsize value to g_memdup may results in integer truncation, allocating a buffer smaller than expected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxNot affected
Red Hat Enterprise Linux 6thunderbirdNot affected
Red Hat Enterprise Linux 9glib2Not affected
Red Hat Enterprise Linux 6 Extended Lifecycle Supportglib2FixedRHSA-2021:246717.06.2021
Red Hat Enterprise Linux 7glib2FixedRHSA-2021:214731.05.2021
Red Hat Enterprise Linux 7.2 Advanced Update Supportglib2FixedRHSA-2021:220302.06.2021
Red Hat Enterprise Linux 7.3 Advanced Update Supportglib2FixedRHSA-2021:217301.06.2021
Red Hat Enterprise Linux 7.4 Advanced Update Supportglib2FixedRHSA-2021:217401.06.2021
Red Hat Enterprise Linux 7.4 Telco Extended Update Supportglib2FixedRHSA-2021:217401.06.2021
Red Hat Enterprise Linux 7.4 Update Services for SAP Solutionsglib2FixedRHSA-2021:217401.06.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-190->CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1929858glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits

EPSS

Процентиль: 45%
0.00226
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 7.5
nvd
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before ...

rocky
почти 4 года назад

Important: glib2 security and bug fix update

EPSS

Процентиль: 45%
0.00226
Низкий

9.8 Critical

CVSS3