Files or Directories Accessible to External Parties Affecting glib2-fam package, versions <0:2.56.4-7.el8
Threat Intelligence
EPSS
1.07% (85th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-GLIB2FAM-3536934
- published 26 Jul 2021
- disclosed 23 May 2019
Introduced: 23 May 2019
CVE-2019-12450 Open this link in a new tabHow to fix?
Upgrade RHEL:8
glib2-fam
to version 0:2.56.4-7.el8 or higher.
This issue was patched in RHSA-2019:3530
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2-fam
package and not the glib2-fam
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
References
- https://security.netapp.com/advisory/ntap-20190606-0003/
- https://access.redhat.com/security/cve/CVE-2019-12450
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4WIOAGO3M743M5KZLVQZM3NGHQDYLI/
- https://gitlab.gnome.org/GNOME/glib/commit/d8f8f4d637ce43f8699ba94c9b7648beda0ca174
- https://lists.debian.org/debian-lts-announce/2019/06/msg00013.html
- https://access.redhat.com/errata/RHSA-2019:3530
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00076.html
- https://usn.ubuntu.com/4014-1/
- https://usn.ubuntu.com/4014-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4WIOAGO3M743M5KZLVQZM3NGHQDYLI/
CVSS Scores
version 3.1