[ubuntu/bionic-security] glib2.0 2.56.4-0ubuntu0.18.04.7 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Mon Mar 8 18:09:19 UTC 2021
glib2.0 (2.56.4-0ubuntu0.18.04.7) bionic-security; urgency=medium
* SECURITY UPDATE: g_byte_array_new_take length truncation
- debian/patches/CVE-2021-2721x/CVE-2021-27218.patch: do not accept too
large byte arrays in glib/garray.c, glib/gbytes.c,
glib/tests/bytes.c.
- CVE-2021-27218
* SECURITY UPDATE: integer overflow in g_bytes_new
- debian/patches/CVE-2021-2721x/CVE-2021-27219*.patch: add internal
g_memdup2() function and use it instead of g_memdup() in a bunch of
places.
- CVE-2021-27219
Date: 2021-03-03 14:00:18.407265+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/glib2.0/2.56.4-0ubuntu0.18.04.7
-------------- next part --------------
Sorry, changesfile not available.
More information about the Bionic-changes
mailing list