[ubuntu/bionic-security] glib2.0 2.56.4-0ubuntu0.18.04.7 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Mon Mar 8 18:09:19 UTC 2021


glib2.0 (2.56.4-0ubuntu0.18.04.7) bionic-security; urgency=medium

  * SECURITY UPDATE: g_byte_array_new_take length truncation
    - debian/patches/CVE-2021-2721x/CVE-2021-27218.patch: do not accept too
      large byte arrays in glib/garray.c, glib/gbytes.c,
      glib/tests/bytes.c.
    - CVE-2021-27218
  * SECURITY UPDATE: integer overflow in g_bytes_new
    - debian/patches/CVE-2021-2721x/CVE-2021-27219*.patch: add internal
      g_memdup2() function and use it instead of g_memdup() in a bunch of
      places.
    - CVE-2021-27219

Date: 2021-03-03 14:00:18.407265+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/glib2.0/2.56.4-0ubuntu0.18.04.7
-------------- next part --------------
Sorry, changesfile not available.


More information about the Bionic-changes mailing list