Количество 24
Количество 24
RLSA-2021:4385
Moderate: glib2 security and bug fix update
ELSA-2021-4385
ELSA-2021-4385: glib2 security and bug fix update (MODERATE)
CVE-2021-3800
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
CVE-2021-3800
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
CVE-2021-3800
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
CVE-2021-3800
A flaw was found in glib before version 2.63.6. Due to random charset alias pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
CVE-2021-3800
A flaw was found in glib before version 2.63.6. Due to random charset ...
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink it incorrectly also creates the target of the symlink as an empty file which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists then the contents of that file correctly remain unchanged.)
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla ...
SUSE-SU-2022:0828-1
Security update for glib2
GHSA-58w9-h6f7-f979
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
BDU:2024-07303
Уязвимость набора библиотек GLib, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
SUSE-SU-2023:0174-1
Security update for glib2
SUSE-SU-2022:1758-2
Security update for glib2
SUSE-SU-2022:1758-1
Security update for glib2
SUSE-SU-2022:1455-2
Security update for glib2
SUSE-SU-2022:1455-1
Security update for glib2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2021:4385 Moderate: glib2 security and bug fix update | около 4 лет назад | |||
ELSA-2021-4385 ELSA-2021-4385: glib2 security and bug fix update (MODERATE) | около 4 лет назад | |||
CVE-2021-3800 A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3800 A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition. | CVSS3: 5.5 | 0% Низкий | почти 5 лет назад | |
CVE-2021-3800 A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3800 A flaw was found in glib before version 2.63.6. Due to random charset alias pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
CVE-2021-3800 A flaw was found in glib before version 2.63.6. Due to random charset ... | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 1% Низкий | почти 5 лет назад | |
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 1% Низкий | почти 5 лет назад | |
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 1% Низкий | почти 5 лет назад | |
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink it incorrectly also creates the target of the symlink as an empty file which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 1% Низкий | больше 4 лет назад | |
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla ... | CVSS3: 5.3 | 1% Низкий | почти 5 лет назад | |
SUSE-SU-2022:0828-1 Security update for glib2 | 0% Низкий | почти 4 года назад | ||
GHSA-58w9-h6f7-f979 A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
BDU:2024-07303 Уязвимость набора библиотек GLib, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 5.5 | 0% Низкий | почти 6 лет назад | |
SUSE-SU-2023:0174-1 Security update for glib2 | 1% Низкий | почти 3 года назад | ||
SUSE-SU-2022:1758-2 Security update for glib2 | 1% Низкий | около 3 лет назад | ||
SUSE-SU-2022:1758-1 Security update for glib2 | 1% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:1455-2 Security update for glib2 | 1% Низкий | почти 3 года назад | ||
SUSE-SU-2022:1455-1 Security update for glib2 | 1% Низкий | больше 3 лет назад |
Уязвимостей на страницу