Unrated severityNVD Advisory· Published Mar 11, 2021· Updated Aug 3, 2024
CVE-2021-28153
CVE-2021-28153
Description
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
Affected products
41- GNOME/GLibdescription
- osv-coords40 versionspkg:rpm/almalinux/glib2-docpkg:rpm/almalinux/glib2-staticpkg:rpm/almalinux/mingw32-glib2pkg:rpm/almalinux/mingw32-glib2-staticpkg:rpm/almalinux/mingw64-glib2pkg:rpm/almalinux/mingw64-glib2-staticpkg:rpm/opensuse/glib2&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/glib2&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/glib2&distro=openSUSE%20Leap%20Micro%205.2pkg:rpm/suse/glib2&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/glib2&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/glib2&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Micro%205.0pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP2pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP3pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/glib2&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/glib2&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.2pkg:rpm/suse/glib2&distro=SUSE%20Manager%20Server%204.2pkg:rpm/suse/glib2&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/glib2&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 2.56.4-156.el8+ 39 more
- (no CPE)range: < 2.56.4-156.el8
- (no CPE)range: < 2.56.4-156.el8
- (no CPE)range: < 2.70.1-2.el9
- (no CPE)range: < 2.70.1-2.el9
- (no CPE)range: < 2.70.1-2.el9
- (no CPE)range: < 2.70.1-2.el9
- (no CPE)range: < 2.62.6-150200.3.9.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.54.3-150000.4.29.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.54.3-150000.4.29.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.62.6-150200.3.9.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.62.6-150200.3.9.1
- (no CPE)range: < 2.62.6-150200.3.9.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.48.2-12.28.1
- (no CPE)range: < 2.48.2-12.28.1
- (no CPE)range: < 2.48.2-12.28.1
- (no CPE)range: < 2.54.3-150000.4.29.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.48.2-12.28.1
- (no CPE)range: < 2.48.2-12.28.1
- (no CPE)range: < 2.54.3-150000.4.29.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.48.2-12.28.1
- (no CPE)range: < 2.48.2-12.28.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.62.6-150200.3.10.1
- (no CPE)range: < 2.48.2-12.28.1
- (no CPE)range: < 2.48.2-12.28.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/mitrevendor-advisoryx_refsource_FEDORA
- security.gentoo.org/glsa/202107-13mitrevendor-advisoryx_refsource_GENTOO
- gitlab.gnome.org/GNOME/glib/-/issues/2325mitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2022/06/msg00006.htmlmitremailing-listx_refsource_MLIST
- security.netapp.com/advisory/ntap-20210416-0003/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.