Important glib2 security update. Provides core object system for GNOME, main loop and utility functions
Reporter | Title | Published | Views | Family All 170 |
---|---|---|---|---|
![]() | RHEL 6 : glib2 (RHSA-2021:2467) | 2 Dec 202100:00 | – | nessus |
![]() | RHEL 7 : glib2 (RHSA-2021:2173) | 11 Jun 202100:00 | – | nessus |
![]() | RHEL 8 : glib2 (RHSA-2021:2171) | 1 Jun 202100:00 | – | nessus |
![]() | AlmaLinux 8 : glib2 (ALSA-2021:2170) | 9 Feb 202200:00 | – | nessus |
![]() | RHEL 7 : glib2 (RHSA-2021:2175) | 11 Jun 202100:00 | – | nessus |
![]() | RHEL 7 : glib2 (RHSA-2021:2174) | 1 Jun 202100:00 | – | nessus |
![]() | Rocky Linux 8 : glib2 (RLSA-2021:2170) | 9 Feb 202200:00 | – | nessus |
![]() | CentOS 7 : glib2 (RHSA-2021:2147) | 14 Jun 202100:00 | – | nessus |
![]() | RHEL 7 : glib2 (RHSA-2021:2204) | 2 Jun 202100:00 | – | nessus |
![]() | RHEL 8 : glib2 (RHSA-2021:2170) | 4 Jun 202100:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | i686 | glib2-static | 2.50.3-4.el7_4 | glib2-static-2.50.3-4.el7_4.i686.rpm |
RedHat | 7 | x86_64 | glib2 | 2.50.3-4.el7_4 | glib2-2.50.3-4.el7_4.x86_64.rpm |
RedHat | 7 | x86_64 | glib2-devel | 2.50.3-4.el7_4 | glib2-devel-2.50.3-4.el7_4.x86_64.rpm |
RedHat | 7 | x86_64 | glib2-static | 2.50.3-4.el7_4 | glib2-static-2.50.3-4.el7_4.x86_64.rpm |
RedHat | 7 | i686 | glib2-devel | 2.50.3-4.el7_4 | glib2-devel-2.50.3-4.el7_4.i686.rpm |
RedHat | 7 | ppc64le | glib2-devel | 2.50.3-4.el7_4 | glib2-devel-2.50.3-4.el7_4.ppc64le.rpm |
RedHat | 7 | x86_64 | glib2-fam | 2.50.3-4.el7_4 | glib2-fam-2.50.3-4.el7_4.x86_64.rpm |
RedHat | 7 | ppc64le | glib2-fam | 2.50.3-4.el7_4 | glib2-fam-2.50.3-4.el7_4.ppc64le.rpm |
RedHat | 7 | ppc64le | glib2-tests | 2.50.3-4.el7_4 | glib2-tests-2.50.3-4.el7_4.ppc64le.rpm |
RedHat | 7 | x86_64 | glib2-debuginfo | 2.50.3-4.el7_4 | glib2-debuginfo-2.50.3-4.el7_4.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo