Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-28153

Опубликовано: 10 мар. 2021
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 6glib2Out of support scope
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7glib2Out of support scope
Red Hat Enterprise Linux 9glib2Not affected
Red Hat Enterprise Linux 8glib2FixedRHSA-2021:438509.11.2021
Red Hat Enterprise Linux 9mingw-glib2FixedRHSA-2022:841815.11.2022

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-59
https://bugzilla.redhat.com/show_bug.cgi?id=1938291glib: g_file_replace() with G_FILE_CREATE_REPLACE_DESTINATION creates empty target for dangling symlink

EPSS

Процентиль: 63%
0.00444
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVSS3: 5.3
nvd
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVSS3: 5.3
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 5.3
debian
больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla ...

suse-cvrf
больше 2 лет назад

Security update for glib2

EPSS

Процентиль: 63%
0.00444
Низкий

5.3 Medium

CVSS3