MGASA-2021-0162

Source
https://advisories.mageia.org/MGASA-2021-0162.html
Import Source
https://advisories.mageia.org/MGASA-2021-0162.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0162
Related
Published
2021-03-30T20:08:49Z
Modified
2021-03-30T19:04:58Z
Summary
Updated glib2.0 packages fix security vulnerability
Details

An issue was discovered in GNOME GLib before 2.66.8. When gfilereplace() is used with GFILECREATEREPLACEDESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) (CVE-2021-28153)

References
Credits

Affected packages

Mageia:8 / glib2.0

Package

Name
glib2.0
Purl
pkg:rpm/mageia/glib2.0?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.66.8-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / mingw-glib2

Package

Name
mingw-glib2
Purl
pkg:rpm/mageia/mingw-glib2?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.66.8-1.mga8

Ecosystem specific

{
    "section": "core"
}