JLSEC-2025-157

See a problem?
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-157.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-157
Upstream
Published
2025-10-19T22:31:43.957Z
Modified
2025-11-03T00:18:56.329770Z
Summary
An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3
Details

An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function gbytesnew has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.

Database specific
{
    "sources": [
        {
            "id": "CVE-2021-27219",
            "modified": "2024-11-21T05:57:37.410Z",
            "imported": "2025-10-19T21:13:23.542Z",
            "published": "2021-02-15T17:15:13.137Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27219",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-27219"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / Glib_jll

Package

Name
Glib_jll
Purl
pkg:julia/Glib_jll?uuid=7746bdde-850d-59dc-9ae8-88ece973131d

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.68.1+0