5
CVSSv2

CVE-2019-13012

Published: 28/06/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The keyfile settings backend in GNOME GLib (aka glib2.0) prior to 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnome glib

Vendor Advisories

Debian Bug report logs - #931234 glib20: CVE-2019-13012: keyfile settings backend: Consider tightening permissions Package: src:glib20; Maintainer for src:glib20 is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 28 Jun 2019 ...
GLib did not properly restrict directory and file permissions ...
GLib did not properly restrict directory and file permissions ...
In GNOME GLib 2561, g_markup_parse_context_end_parse() in gmarkupc has a NULL pointer dereference (CVE-2018-16428) GNOME GLib 2561 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkupc, related to utf8_str() (CVE-2018-16429) The keyfile settings backend in GNOME GLib (aka glib20) before 2600 creates direct ...
Impact: Low Public Date: 2019-06-28 CWE: CWE-732 Bugzilla: 1728632: CVE-2019-13012 glib2: insecure perm ...