Subject: | |
From: | |
Reply To: | |
Date: | Tue, 1 Jun 2021 15:38:45 -0000 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Important: glib2 security update
Advisory ID: SLSA-2021:2147-1
Issue Date: 2021-06-01
CVE Numbers: CVE-2021-27219
--
Security Fix(es):
* glib: integer overflow in g_bytes_new function on 64-bit platforms due
to an implicit cast from 64 bits to 32 bits (CVE-2021-27219)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
-----
SL7
x86_64
- glib2-2.56.1-9.el7_9.i686.rpm
- glib2-2.56.1-9.el7_9.x86_64.rpm
- glib2-debuginfo-2.56.1-9.el7_9.i686.rpm
- glib2-debuginfo-2.56.1-9.el7_9.x86_64.rpm
- glib2-devel-2.56.1-9.el7_9.i686.rpm
- glib2-devel-2.56.1-9.el7_9.x86_64.rpm
- glib2-fam-2.56.1-9.el7_9.x86_64.rpm
- glib2-static-2.56.1-9.el7_9.i686.rpm
- glib2-static-2.56.1-9.el7_9.x86_64.rpm
- glib2-tests-2.56.1-9.el7_9.x86_64.rpm
noarch
- glib2-doc-2.56.1-9.el7_9.noarch.rpm
--
- Scientific Linux Development Team
|
|
|