CVE-2019-13012

Published on: 06/28/2019 12:00:00 AM UTC

Last Modified on: 06/29/2021 03:15:00 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Certain versions of Glib from Gnome contain the following vulnerability:

The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.

  • CVE-2019-13012 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
[SECURITY] [DLA 1866-1] glib2.0 security update lists.debian.org
text/html
URL Logo MLIST [debian-lts-announce] 20190731 [SECURITY] [DLA 1866-1] glib2.0 security update
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
[SECURITY] [DLA 1866-2] glib2.0 regression update lists.debian.org
text/html
URL Logo MLIST [debian-lts-announce] 20190805 [SECURITY] [DLA 1866-2] glib2.0 regression update
USN-4049-2: GLib vulnerability | Ubuntu security notices usn.ubuntu.com
text/html
URL Logo UBUNTU USN-4049-2
#931234 - glib2.0: CVE-2019-13012: keyfile settings backend: Consider tightening permissions - Debian Bug report logs bugs.debian.org
text/html
URL Logo CONFIRM bugs.debian.org/cgi-bin/bugreport.cgi?bug=931234#12
USN-4049-1: GLib vulnerability | Ubuntu security notices | Ubuntu usn.ubuntu.com
text/html
URL Logo UBUNTU USN-4049-1
CVE-2019-13012 GNOME GLib Vulnerability in NetApp Products | NetApp Product Security security.netapp.com
text/html
URL Logo CONFIRM security.netapp.com/advisory/ntap-20190806-0003/
Settings portal (!450) · Merge Requests · GNOME / GLib · GitLab Issue Tracking
Third Party Advisory
gitlab.gnome.org
text/html
URL Logo MISC gitlab.gnome.org/GNOME/glib/merge_requests/450
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
keyfile settings: Use tighter permissions (5e4da714) · Commits · GNOME / GLib · GitLab Patch
Third Party Advisory
gitlab.gnome.org
text/html
URL Logo MISC gitlab.gnome.org/GNOME/glib/commit/5e4da714f00f6bfb2ccd6d73d61329c6f3a08429
[security-announce] openSUSE-SU-2019:1749-1: moderate: Security update f lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2019:1749
keyfile settings backend: Consider tightening permissions (#1658) · Issues · GNOME / GLib · GitLab Third Party Advisory
gitlab.gnome.org
text/html
URL Logo MISC gitlab.gnome.org/GNOME/glib/issues/1658

Related QID Numbers

  • 159189 Oracle Enterprise Linux Security Update for GNOME (ELSA-2021-1586)
  • 239335 Red Hat Update for GNOME (RHSA-2021:1586)
  • 377338 Alibaba Cloud Linux Security Update for glib2 (ALINUX3-SA-2021:0055)
  • 900016 CBL-Mariner Linux Security Update for glib 2.58.0
  • 902850 Common Base Linux Mariner (CBL-Mariner) Security Update for glib (1921)
  • 940249 AlmaLinux Security Update for GNOME (ALSA-2021:1586)

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationGnomeGlibAllAllAllAll
ApplicationGnomeGlibAllAllAllAll
  • cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Reddit Logo Icon /r/Simplivity Critical Omnistack Update released 2020-12-10 19:09:32
© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report