Content-Type: |
text/plain; charset="utf-8" |
Date: |
Tue, 1 Jun 2021 15:38:45 -0000 |
Reply-To: |
|
Subject: |
|
MIME-Version: |
1.0 |
Message-ID: |
<20210601153845.2828.37497@4d14c5bc2382> |
Content-Transfer-Encoding: |
7bit |
Sender: |
|
From: |
|
Parts/Attachments: |
|
|
Synopsis: Important: glib2 security update
Advisory ID: SLSA-2021:2147-1
Issue Date: 2021-06-01
CVE Numbers: CVE-2021-27219
--
Security Fix(es):
* glib: integer overflow in g_bytes_new function on 64-bit platforms due
to an implicit cast from 64 bits to 32 bits (CVE-2021-27219)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
-----
SL7
x86_64
- glib2-2.56.1-9.el7_9.i686.rpm
- glib2-2.56.1-9.el7_9.x86_64.rpm
- glib2-debuginfo-2.56.1-9.el7_9.i686.rpm
- glib2-debuginfo-2.56.1-9.el7_9.x86_64.rpm
- glib2-devel-2.56.1-9.el7_9.i686.rpm
- glib2-devel-2.56.1-9.el7_9.x86_64.rpm
- glib2-fam-2.56.1-9.el7_9.x86_64.rpm
- glib2-static-2.56.1-9.el7_9.i686.rpm
- glib2-static-2.56.1-9.el7_9.x86_64.rpm
- glib2-tests-2.56.1-9.el7_9.x86_64.rpm
noarch
- glib2-doc-2.56.1-9.el7_9.noarch.rpm
--
- Scientific Linux Development Team
|
|
|