First published: Thu Jun 17 2021(Updated: )
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.<br>Security Fix(es):<br><li> glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits (CVE-2021-27219)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/glib2 | <2.28.8-11.el6_10 | 2.28.8-11.el6_10 |
redhat/glib2 | <2.28.8-11.el6_10 | 2.28.8-11.el6_10 |
redhat/glib2-debuginfo | <2.28.8-11.el6_10 | 2.28.8-11.el6_10 |
redhat/glib2-debuginfo | <2.28.8-11.el6_10 | 2.28.8-11.el6_10 |
redhat/glib2-devel | <2.28.8-11.el6_10 | 2.28.8-11.el6_10 |
redhat/glib2-devel | <2.28.8-11.el6_10 | 2.28.8-11.el6_10 |
redhat/glib2-doc | <2.28.8-11.el6_10 | 2.28.8-11.el6_10 |
redhat/glib2-static | <2.28.8-11.el6_10 | 2.28.8-11.el6_10 |
redhat/glib2-static | <2.28.8-11.el6_10 | 2.28.8-11.el6_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The RHSA-2021:2467 vulnerability has been classified as a moderate severity issue.
To fix RHSA-2021:2467, update the affected packages to version 2.28.8-11.el6_10.
The RHSA-2021:2467 vulnerability affects the glib2, glib2-debuginfo, glib2-devel, glib2-doc, and glib2-static packages.
There are no official workarounds provided for RHSA-2021:2467, so updating to the patched version is recommended.
Failing to address RHSA-2021:2467 may expose systems to potential exploitation due to security vulnerabilities in glib.