Search for packages
purl | pkg:deb/ubuntu/glib2.0@2.64.6-1~ubuntu20.04.3 |
Next non-vulnerable version | 2.64.6-1~ubuntu20.04.4 |
Latest non-vulnerable version | 2.64.6-1~ubuntu20.04.4 |
Risk | 3.4 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-dh4p-ygqy-aaak
Aliases: CVE-2021-3800 |
CVE-2021-3800 glib2: Possible privilege escalation thourgh pkexec and aliases |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-38zg-dgk4-aaac | An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.) |
CVE-2021-28153
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|