Description
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3044-1 | glib2.0 security update |
EUVD |
EUVD-2021-13983 | An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation. |
Ubuntu USN |
USN-4759-1 | GLib vulnerabilities |
References
History
No history.
Subscriptions
Broadcom
Subscribe
Brocade Fabric Operating System Firmware
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Gnome
Subscribe
Glib
Subscribe
Netapp
Subscribe
Active Iq Unified Manager
Subscribe
Cloud Backup
Subscribe
E-series Performance Analyzer
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T20:40:47.531Z
Reserved: 2021-02-15T00:00:00.000Z
Link: CVE-2021-27218
No data.
Status : Modified
Published: 2021-02-15T17:15:13.073
Modified: 2024-11-21T05:57:37.240
Link: CVE-2021-27218
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN