← Zuruck zu CVEs
CVE-2019-12450
CRITICAL9.8
Beschreibung
file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht5/29/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoragnome:glibopensuse:leapredhat:enterprise_linuxredhat:enterprise_linux_eusredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tus
Schwachen (CWE)
CWE-276CWE-362
Referenzen
https://access.redhat.com/errata/RHSA-2019:3530(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4WIOAGO3M743M5KZLVQZM3NGHQDYLI/(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20190606-0003/(cve@mitre.org)
https://usn.ubuntu.com/4014-1/(cve@mitre.org)
https://usn.ubuntu.com/4014-2/(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00076.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3530(af854a3a-2127-422b-91ae-364da2661108)
https://gitlab.gnome.org/GNOME/glib/commit/d8f8f4d637ce43f8699ba94c9b7648beda0ca174(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/06/msg00013.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4WIOAGO3M743M5KZLVQZM3NGHQDYLI/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190606-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4014-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4014-2/(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.