JLSEC-2025-156

See a problem?
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-156.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-156
Upstream
Published
2025-10-19T22:31:43.957Z
Modified
2025-11-03T00:18:55.774254Z
Summary
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4
Details

An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If gbytearraynewtake() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.

Database specific
{
    "sources": [
        {
            "id": "CVE-2021-27218",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-27218",
            "imported": "2025-10-19T21:13:23.539Z",
            "published": "2021-02-15T17:15:13.073Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27218",
            "modified": "2024-11-21T05:57:37.240Z"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / Glib_jll

Package

Name
Glib_jll
Purl
pkg:julia/Glib_jll?uuid=7746bdde-850d-59dc-9ae8-88ece973131d

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.68.1+0