Количество 16
Количество 16
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink it incorrectly also creates the target of the symlink as an empty file which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists then the contents of that file correctly remain unchanged.)
CVE-2021-28153
An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla ...
SUSE-SU-2023:0174-1
Security update for glib2
SUSE-SU-2022:1758-2
Security update for glib2
SUSE-SU-2022:1758-1
Security update for glib2
SUSE-SU-2022:1455-2
Security update for glib2
SUSE-SU-2022:1455-1
Security update for glib2
GHSA-9hh6-p5c5-mmmf
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
ELSA-2022-8418
ELSA-2022-8418: mingw-glib2 security and bug fix update (LOW)
BDU:2022-00320
Уязвимость функции g_file_replace() библиотеки Glib, связанная с возможностью работы под учетной записью операционной системы без полномочий root, позволяющая нарушителю оказать воздействие на целостность данных
RLSA-2021:4385
Moderate: glib2 security and bug fix update
ELSA-2021-4385
ELSA-2021-4385: glib2 security and bug fix update (MODERATE)
SUSE-SU-2023:3535-1
Security update for glib2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 1% Низкий | почти 5 лет назад | |
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 1% Низкий | почти 5 лет назад | |
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 1% Низкий | почти 5 лет назад | |
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink it incorrectly also creates the target of the symlink as an empty file which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 1% Низкий | больше 4 лет назад | |
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla ... | CVSS3: 5.3 | 1% Низкий | почти 5 лет назад | |
SUSE-SU-2023:0174-1 Security update for glib2 | 1% Низкий | почти 3 года назад | ||
SUSE-SU-2022:1758-2 Security update for glib2 | 1% Низкий | около 3 лет назад | ||
SUSE-SU-2022:1758-1 Security update for glib2 | 1% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:1455-2 Security update for glib2 | 1% Низкий | почти 3 года назад | ||
SUSE-SU-2022:1455-1 Security update for glib2 | 1% Низкий | больше 3 лет назад | ||
GHSA-9hh6-p5c5-mmmf An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) | CVSS3: 5.3 | 1% Низкий | больше 3 лет назад | |
ELSA-2022-8418 ELSA-2022-8418: mingw-glib2 security and bug fix update (LOW) | около 3 лет назад | |||
BDU:2022-00320 Уязвимость функции g_file_replace() библиотеки Glib, связанная с возможностью работы под учетной записью операционной системы без полномочий root, позволяющая нарушителю оказать воздействие на целостность данных | CVSS3: 5.3 | 1% Низкий | почти 5 лет назад | |
RLSA-2021:4385 Moderate: glib2 security and bug fix update | около 4 лет назад | |||
ELSA-2021-4385 ELSA-2021-4385: glib2 security and bug fix update (MODERATE) | около 4 лет назад | |||
SUSE-SU-2023:3535-1 Security update for glib2 | больше 2 лет назад |
Уязвимостей на страницу