Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:3058

Опубликовано: 12 авг. 2021
Источник: rocky
Оценка: Moderate

Описание

Moderate: glib2 security update

For more information visit https://errata.rockylinux.org/RLSA-2021:3058

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
glib2-famx86_6410.el8_4.1glib2-fam-2.56.4-10.el8_4.1.x86_64.rpm
glib2-testsx86_6410.el8_4.1glib2-tests-2.56.4-10.el8_4.1.x86_64.rpm
glib2-develi68610.el8_4.1glib2-devel-2.56.4-10.el8_4.1.i686.rpm
glib2i68610.el8_4.1glib2-2.56.4-10.el8_4.1.i686.rpm
glib2x86_6410.el8_4.1glib2-2.56.4-10.el8_4.1.x86_64.rpm
glib2-develx86_6410.el8_4.1glib2-devel-2.56.4-10.el8_4.1.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
redhat
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
nvd
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before ...