First published: Wed May 29 2019(Updated: )
file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 creates new files with default permissions and set the correct permissions after the operation is finished. This might cause that the files can be accessible by more users during the operation than expected. Upstream Commit: <a href="https://gitlab.gnome.org/GNOME/glib/commit/d8f8f4d637ce43f8699ba94c9b7648beda0ca174">https://gitlab.gnome.org/GNOME/glib/commit/d8f8f4d637ce43f8699ba94c9b7648beda0ca174</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/glib2.0 | <2.56.4-0ubuntu0.18.04.3 | 2.56.4-0ubuntu0.18.04.3 |
ubuntu/glib2.0 | <2.58.1-2ubuntu0.1 | 2.58.1-2ubuntu0.1 |
ubuntu/glib2.0 | <2.60.0-1ubuntu0.1 | 2.60.0-1ubuntu0.1 |
ubuntu/glib2.0 | <2.40.2-0ubuntu1.1+ | 2.40.2-0ubuntu1.1+ |
ubuntu/glib2.0 | <2.48.2-0ubuntu4.2 | 2.48.2-0ubuntu4.2 |
debian/glib2.0 | 2.66.8-1+deb11u4 2.66.8-1+deb11u3 2.74.6-2+deb12u3 2.74.6-2+deb12u2 2.82.0-1 | |
IBM InfoSphere Guardium z/OS | <=10.5 | |
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.0 | |
IBM InfoSphere Guardium z/OS | <=11.1 | |
IBM InfoSphere Guardium z/OS | <=11.2 | |
IBM InfoSphere Guardium z/OS | <=11.3 | |
GNOME GLib | >=2.15.0<=2.61.1 | |
Debian GNU/Linux | =8.0 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux eus | =8.1 | |
redhat enterprise Linux eus | =8.2 | |
redhat enterprise Linux eus | =8.4 | |
redhat enterprise Linux eus | =8.6 | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server aus | =8.4 | |
redhat enterprise Linux server aus | =8.6 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server tus | =8.4 | |
redhat enterprise Linux server tus | =8.6 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
Ubuntu Linux | =19.04 | |
openSUSE | =15.0 | |
Fedoraproject Fedora | =30 | |
GNOME libraries | >=2.15.0<=2.61.1 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Ubuntu | =19.04 | |
Fedora | =30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12450 is a vulnerability in GNOME GLib 2.15.0 through 2.61.1 that allows a remote attacker to bypass security restrictions.
CVE-2019-12450 affects IBM Security Guardium versions 10.5 through 11.3.
CVE-2019-12450 affects the glib2.0 package in Ubuntu versions disco (2.60.0-1ubuntu0.1), bionic (2.56.4-0ubuntu0.18.04.3), and cosmic (2.58.1-2ubuntu0.1).
CVE-2019-12450 has a severity rating of critical (9.8).
You can find more information about CVE-2019-12450 in the references: http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00076.html, https://access.redhat.com/errata/RHSA-2019:3530, https://gitlab.gnome.org/GNOME/glib/commit/d8f8f4d637ce43f8699ba94c9b7648beda0ca174.