Описание
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2.56.4-0ubuntu0.18.04.7 |
devel | not-affected | 2.67.5-2 |
esm-infra-legacy/trusty | needed | |
esm-infra/bionic | not-affected | 2.56.4-0ubuntu0.18.04.7 |
esm-infra/focal | not-affected | 2.64.6-1~ubuntu20.04.2 |
esm-infra/xenial | not-affected | 2.48.2-0ubuntu4.7 |
focal | released | 2.64.6-1~ubuntu20.04.2 |
groovy | released | 2.66.1-2ubuntu0.1 |
hirsute | not-affected | 2.67.5-2 |
impish | not-affected | 2.67.5-2 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before ...
EPSS
5 Medium
CVSS2
7.5 High
CVSS3