Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-27219

Опубликовано: 15 фев. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

РелизСтатусПримечание
bionic

released

2.56.4-0ubuntu0.18.04.7
devel

not-affected

2.67.5-2
esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

2.56.4-0ubuntu0.18.04.7
esm-infra/focal

not-affected

2.64.6-1~ubuntu20.04.2
esm-infra/xenial

not-affected

2.48.2-0ubuntu4.7
focal

released

2.64.6-1~ubuntu20.04.2
groovy

released

2.66.1-2ubuntu0.1
hirsute

not-affected

2.67.5-2
impish

not-affected

2.67.5-2

Показывать по

EPSS

Процентиль: 45%
0.00226
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 7.5
nvd
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before ...

rocky
почти 4 года назад

Important: glib2 security and bug fix update

EPSS

Процентиль: 45%
0.00226
Низкий

5 Medium

CVSS2

7.5 High

CVSS3