CVE-2019-13012

NameCVE-2019-13012
DescriptionThe keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1866-1, DLA-1866-2
Debian Bugs931234

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glib2.0 (PTS)bullseye2.66.8-1+deb11u4fixed
bullseye (security)2.66.8-1+deb11u3fixed
bookworm2.74.6-2+deb12u3fixed
bookworm (security)2.74.6-2+deb12u2fixed
sid, trixie2.82.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glib2.0sourceexperimental2.60.0-1
glib2.0sourcejessie2.42.1-1+deb8u3DLA-1866-2
glib2.0sourcestretch2.50.3-2+deb9u1
glib2.0sourcebuster2.58.3-2+deb10u1
glib2.0source(unstable)2.60.5-1931234

Notes

https://gitlab.gnome.org/GNOME/glib/issues/1658
https://gitlab.gnome.org/GNOME/glib/merge_requests/450
https://gitlab.gnome.org/GNOME/glib/commit/5e4da714f00f6bfb2ccd6d73d61329c6f3a08429

Search for package or bug name: Reporting problems