Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-27218

Опубликовано: 15 фев. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

РелизСтатусПримечание
bionic

released

2.56.4-0ubuntu0.18.04.7
devel

not-affected

2.67.5-2
esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

2.56.4-0ubuntu0.18.04.7
esm-infra/focal

not-affected

2.64.6-1~ubuntu20.04.2
esm-infra/xenial

not-affected

2.48.2-0ubuntu4.7
focal

released

2.64.6-1~ubuntu20.04.2
groovy

released

2.66.1-2ubuntu0.1
hirsute

not-affected

2.67.5-2
impish

not-affected

2.67.5-2

Показывать по

EPSS

Процентиль: 86%
0.03013
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
nvd
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before ...

rocky
почти 4 года назад

Moderate: glib2 security update

EPSS

Процентиль: 86%
0.03013
Низкий

5 Medium

CVSS2

7.5 High

CVSS3