Описание
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 2.56.4-0ubuntu0.18.04.7 |
| devel | not-affected | 2.67.5-2 |
| esm-infra-legacy/trusty | needed | |
| esm-infra/bionic | released | 2.56.4-0ubuntu0.18.04.7 |
| esm-infra/focal | released | 2.64.6-1~ubuntu20.04.2 |
| esm-infra/xenial | released | 2.48.2-0ubuntu4.7 |
| focal | released | 2.64.6-1~ubuntu20.04.2 |
| groovy | released | 2.66.1-2ubuntu0.1 |
| hirsute | not-affected | 2.67.5-2 |
| impish | not-affected | 2.67.5-2 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform the length would be truncated modulo 2**32 causing unintended length truncation.
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before ...
EPSS
5 Medium
CVSS2
7.5 High
CVSS3