Количество 15
Количество 15
GHSA-9hh6-p5c5-mmmf
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVE-2021-28153
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla ...

SUSE-SU-2023:0174-1
Security update for glib2

SUSE-SU-2022:1758-2
Security update for glib2

SUSE-SU-2022:1758-1
Security update for glib2

SUSE-SU-2022:1455-2
Security update for glib2

SUSE-SU-2022:1455-1
Security update for glib2
ELSA-2022-8418
ELSA-2022-8418: mingw-glib2 security and bug fix update (LOW)

BDU:2022-00320
Уязвимость функции g_file_replace() библиотеки Glib, связанная с возможностью работы под учетной записью операционной системы без полномочий root, позволяющая нарушителю оказать воздействие на целостность данных
ELSA-2021-4385
ELSA-2021-4385: glib2 security and bug fix update (MODERATE)

SUSE-SU-2023:3535-1
Security update for glib2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-9hh6-p5c5-mmmf An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 0% Низкий | больше 3 лет назад | |
![]() | CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla ... | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
![]() | SUSE-SU-2023:0174-1 Security update for glib2 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:1758-2 Security update for glib2 | 0% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:1758-1 Security update for glib2 | 0% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:1455-2 Security update for glib2 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:1455-1 Security update for glib2 | 0% Низкий | больше 3 лет назад | |
ELSA-2022-8418 ELSA-2022-8418: mingw-glib2 security and bug fix update (LOW) | почти 3 года назад | |||
![]() | BDU:2022-00320 Уязвимость функции g_file_replace() библиотеки Glib, связанная с возможностью работы под учетной записью операционной системы без полномочий root, позволяющая нарушителю оказать воздействие на целостность данных | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
ELSA-2021-4385 ELSA-2021-4385: glib2 security and bug fix update (MODERATE) | почти 4 года назад | |||
![]() | SUSE-SU-2023:3535-1 Security update for glib2 | около 2 лет назад |
Уязвимостей на страницу