Buffer Truncation Vulnerability in GNOME GLib by GNOME
CVE-2021-27218
7.5HIGH
Summary
A vulnerability exists in GNOME GLib that affects 64-bit platforms when the function g_byte_array_new_take() is called with a buffer size of 4GB or more. This scenario causes the length of the buffer to be truncated modulo 2^32, potentially leading to unexpected behaviors and security vulnerabilities in applications relying on accurate length processing. Users are advised to upgrade to the latest versions to mitigate risks associated with this issue.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved