Количество 23
Количество 23
ELSA-2021-4385
ELSA-2021-4385: glib2 security and bug fix update (MODERATE)

CVE-2021-3800
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

CVE-2021-3800
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

CVE-2021-3800
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

CVE-2021-3800
CVE-2021-3800
A flaw was found in glib before version 2.63.6. Due to random charset ...

CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVE-2021-28153
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla ...

SUSE-SU-2022:0828-1
Security update for glib2
GHSA-58w9-h6f7-f979
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

BDU:2024-07303
Уязвимость набора библиотек GLib, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

SUSE-SU-2023:0174-1
Security update for glib2

SUSE-SU-2022:1758-2
Security update for glib2

SUSE-SU-2022:1758-1
Security update for glib2

SUSE-SU-2022:1455-2
Security update for glib2

SUSE-SU-2022:1455-1
Security update for glib2
GHSA-9hh6-p5c5-mmmf
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2021-4385 ELSA-2021-4385: glib2 security and bug fix update (MODERATE) | почти 4 года назад | |||
![]() | CVE-2021-3800 A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад |
![]() | CVE-2021-3800 A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition. | CVSS3: 5.5 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-3800 A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад |
![]() | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
CVE-2021-3800 A flaw was found in glib before version 2.63.6. Due to random charset ... | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla ... | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
![]() | SUSE-SU-2022:0828-1 Security update for glib2 | 0% Низкий | больше 3 лет назад | |
GHSA-58w9-h6f7-f979 A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition. | CVSS3: 7.5 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2024-07303 Уязвимость набора библиотек GLib, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 5.5 | 0% Низкий | больше 5 лет назад |
![]() | SUSE-SU-2023:0174-1 Security update for glib2 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:1758-2 Security update for glib2 | 0% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:1758-1 Security update for glib2 | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:1455-2 Security update for glib2 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:1455-1 Security update for glib2 | 0% Низкий | больше 3 лет назад | |
GHSA-9hh6-p5c5-mmmf An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу