CVE-2009-3289

NameCVE-2009-3289
DescriptionThe g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glib2.0 (PTS)bullseye2.66.8-1+deb11u4fixed
bullseye (security)2.66.8-1+deb11u3fixed
bookworm2.74.6-2+deb12u3fixed
bookworm (security)2.74.6-2+deb12u2fixed
sid, trixie2.80.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glib2.0sourcelenny2.16.6-3
glib2.0source(unstable)2.22.0-1low

Notes

[etch] - glib2.0 <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems