#12084 closed enhancement (fixed)
glib-2.60.4 (CVE-2019-12450)
Reported by: | Bruce Dubbs | Owned by: | Douglas R. Reno |
---|---|---|---|
Priority: | highest | Milestone: | 9.0 |
Component: | BOOK | Version: | SVN |
Severity: | normal | Keywords: | |
Cc: |
Description ¶
New point version.
Change History (7)
comment:1 by , 6 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:2 by , 6 years ago
comment:3 by , 6 years ago
Priority: | normal → highest |
---|---|
Summary: | glib-2.60.3 → glib-2.60.4 (CVE-2019-12450) |
Heads up, this was just upgraded to 2.60.4
News ==== * Fixes to improved network status detection with NetworkManager (#1788) * Leak fixes to some `glib-genmarshal` generated code (#1793) * Further fixes to the Happy Eyeballs (RFC 8305) implementation (!865) * File system permissions fix to clamp down permissions in a small time window when copying files (CVE-2019-12450, !876) * Bugs fixed: - #1755 Please revert #535 gmacros: Try to use the standard __func__ first in G_STRFUNC - #1788 GNetworkMonitor claims I am offline - #1792 glib-genmarshal generated valist marshal does not respect static scope for some types - #1793 glib-genmarshal generates wrong code for va marshaler for VARIANT type - #1795 Fix mingw32 CI on older branches - !865 gnetworkaddress: fix "happy eyeballs" logic - !878 Backport !876 “gfile: Limit access to files when copying” to glib-2-60
From the United States National Vulnerability Database:
Current Description file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used. Source: MITRE Description Last Modified: 05/29/2019 View Analysis Description Impact CVSS v3.0 Severity and Metrics: Base Score: 9.8 CRITICAL Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (V3 legend) Impact Score: 5.9 Exploitability Score: 3.9 Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None Scope (S): Unchanged Confidentiality (C): High Integrity (I): High Availability (A): High CVSS v2.0 Severity and Metrics: Base Score: 7.5 HIGH Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P) (V2 legend) Impact Subscore: 6.4 Exploitability Subscore: 10.0 Access Vector (AV): Network Access Complexity (AC): Low Authentication (AU): None Confidentiality (C): Partial Integrity (I): Partial Availability (A): Partial Additional Information: Allows unauthorized disclosure of information Allows unauthorized modification Allows disruption of service
Under CVSSv3, it's marked as 9.8 CRITICAL. That's out of 10.
As a result, I'm promoting this to Highest priority.
comment:4 by , 6 years ago
Owner: | changed from | to
---|---|
Status: | assigned → new |
comment:5 by , 6 years ago
Status: | new → assigned |
---|
Note:
See TracTickets
for help on using tickets.
Overview of changes in GLib 2.60.3
GHashTable