Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:3058

Опубликовано: 10 авг. 2021
Источник: rocky
Оценка: Moderate

Описание

Moderate: glib2 security update

GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.

Security Fix(es):

  • glib: integer overflow in g_byte_array_new_take function when called with a buffer of 4GB or more on a 64-bit platform (CVE-2021-27218)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
glib2-famx86_6410.el8_4.1glib2-fam-2.56.4-10.el8_4.1.x86_64.rpm
glib2-testsx86_6410.el8_4.1glib2-tests-2.56.4-10.el8_4.1.x86_64.rpm
glib2-develi68610.el8_4.1glib2-devel-2.56.4-10.el8_4.1.i686.rpm
glib2i68610.el8_4.1glib2-2.56.4-10.el8_4.1.i686.rpm
glib2x86_6410.el8_4.1glib2-2.56.4-10.el8_4.1.x86_64.rpm
glib2-develx86_6410.el8_4.1glib2-devel-2.56.4-10.el8_4.1.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 5 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
redhat
почти 5 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
nvd
почти 5 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
msrc
почти 5 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform the length would be truncated modulo 2**32 causing unintended length truncation.

CVSS3: 7.5
debian
почти 5 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before ...