CVE-2021-27218
Severity
7.5HIGH
EPSS
5.2%
top 10.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 15
Latest updateMay 24
Description
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
Also affects: Debian Linux 9.0, Fedora 33, 34
Patches
🔴Vulnerability Details
4📋Vendor Advisories
7Oracle▶
Oracle Oracle Hyperion Risk Matrix: Installation and Configuration (Eclipse Jetty) — CVE-2020-27218↗2021-10-15
Oracle▶
Oracle Oracle Communications Risk Matrix: Subscriber profile (Eclipse Jetty) — CVE-2020-27218↗2021-07-15
Oracle▶
Oracle Oracle Communications Risk Matrix: SC Admin server (Eclipse Jetty) — CVE-2020-27218↗2021-04-15
Red Hat▶
glib: integer overflow in g_byte_array_new_take function when called with a buffer of 4GB or more on a 64-bit platform↗2021-02-10