Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:2170

Опубликовано: 22 июл. 2021
Источник: rocky
Оценка: Important

Описание

Important: glib2 security and bug fix update

For more information visit https://errata.rockylinux.org/RLSA-2021:2170

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
glib2-testsx86_6410.el8_4glib2-tests-2.56.4-10.el8_4.x86_64.rpm
glib2-famx86_6410.el8_4glib2-fam-2.56.4-10.el8_4.x86_64.rpm
glib2x86_6410.el8_4glib2-2.56.4-10.el8_4.x86_64.rpm
glib2-develx86_6410.el8_4glib2-devel-2.56.4-10.el8_4.x86_64.rpm
glib2-develi68610.el8_4glib2-devel-2.56.4-10.el8_4.i686.rpm
glib2i68610.el8_4glib2-2.56.4-10.el8_4.i686.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 9.8
redhat
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 7.5
nvd
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before ...