SciLinux: SLSA-2021-2147-1 Important: glib2 on x86_64 | LinuxSecur...

Advisories

Synopsis:          Important: glib2 security update
Advisory ID:       SLSA-2021:2147-1
Issue Date:        2021-06-01
CVE Numbers:       CVE-2021-27219
--

Security Fix(es):

* glib: integer overflow in g_bytes_new function on 64-bit platforms due
to  an implicit cast from 64 bits to 32 bits (CVE-2021-27219)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE

-----

SL7
 x86_64
 - glib2-2.56.1-9.el7_9.i686.rpm
 - glib2-2.56.1-9.el7_9.x86_64.rpm
 - glib2-debuginfo-2.56.1-9.el7_9.i686.rpm
 - glib2-debuginfo-2.56.1-9.el7_9.x86_64.rpm
 - glib2-devel-2.56.1-9.el7_9.i686.rpm
 - glib2-devel-2.56.1-9.el7_9.x86_64.rpm
 - glib2-fam-2.56.1-9.el7_9.x86_64.rpm
 - glib2-static-2.56.1-9.el7_9.i686.rpm
 - glib2-static-2.56.1-9.el7_9.x86_64.rpm
 - glib2-tests-2.56.1-9.el7_9.x86_64.rpm
 noarch
 - glib2-doc-2.56.1-9.el7_9.noarch.rpm
--

- Scientific Linux Development Team

SciLinux: SLSA-2021-2147-1 Important: glib2 on x86_64

Summary

Important: glib2 security update



Security Fixes

* glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits (CVE-2021-27219)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE

SL7 x86_64 - glib2-2.56.1-9.el7_9.i686.rpm - glib2-2.56.1-9.el7_9.x86_64.rpm - glib2-debuginfo-2.56.1-9.el7_9.i686.rpm - glib2-debuginfo-2.56.1-9.el7_9.x86_64.rpm - glib2-devel-2.56.1-9.el7_9.i686.rpm - glib2-devel-2.56.1-9.el7_9.x86_64.rpm - glib2-fam-2.56.1-9.el7_9.x86_64.rpm - glib2-static-2.56.1-9.el7_9.i686.rpm - glib2-static-2.56.1-9.el7_9.x86_64.rpm - glib2-tests-2.56.1-9.el7_9.x86_64.rpm noarch - glib2-doc-2.56.1-9.el7_9.noarch.rpm
- Scientific Linux Development Team

Severity
Advisory ID: SLSA-2021:2147-1
Issued Date: : 2021-06-01
CVE Numbers: CVE-2021-27219

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.