CVE-2021-27218

Severity
7.5HIGH
EPSS
5.2%
top 10.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 15
Latest updateMay 24

Description

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDgnome/glib2.67.02.67.4+1
Debianglib2.0< 2.66.7-1+3
Ubuntuglib2.0< 2.48.2-0ubuntu4.7+2

Also affects: Debian Linux 9.0, Fedora 33, 34

Patches

🔴Vulnerability Details

4
GHSA
GHSA-vvj7-w55j-xgmw: An issue was discovered in GNOME GLib before 22022-05-24
OSV
glib2.0 vulnerabilities2021-03-08
OSV
CVE-2021-27218: An issue was discovered in GNOME GLib before 22021-02-15
CVEList
CVE-2021-27218: An issue was discovered in GNOME GLib before 22021-02-15

📋Vendor Advisories

7
Oracle
Oracle Oracle Hyperion Risk Matrix: Installation and Configuration (Eclipse Jetty) — CVE-2020-272182021-10-15
Oracle
Oracle Oracle Communications Risk Matrix: Subscriber profile (Eclipse Jetty) — CVE-2020-272182021-07-15
Oracle
Oracle Oracle Communications Risk Matrix: SC Admin server (Eclipse Jetty) — CVE-2020-272182021-04-15
Ubuntu
GLib vulnerabilities2021-03-08
Red Hat
glib: integer overflow in g_byte_array_new_take function when called with a buffer of 4GB or more on a 64-bit platform2021-02-10
CVE-2021-27218 (HIGH CVSS 7.5) | An issue was discovered in GNOME GL | cvebase.io