CVE-2019-13012

NameCVE-2019-13012
DescriptionThe keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1866-1, DLA-1866-2
NVD severitymedium (attack range: remote)
Debian Bugs931234

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glib2.0 (PTS)jessie2.42.1-1vulnerable
jessie (security)2.42.1-1+deb8u3fixed
stretch2.50.3-2vulnerable
buster2.58.3-2vulnerable
bullseye, sid2.60.6-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glib2.0source(unstable)2.60.5-1medium931234
glib2.0sourceexperimental2.60.0-1medium
glib2.0sourcejessie2.42.1-1+deb8u3mediumDLA-1866-2

Notes

[buster] - glib2.0 <no-dsa> (Minor issue)
[stretch] - glib2.0 <no-dsa> (Minor issue)
https://gitlab.gnome.org/GNOME/glib/issues/1658
https://gitlab.gnome.org/GNOME/glib/merge_requests/450
https://gitlab.gnome.org/GNOME/glib/commit/5e4da714f00f6bfb2ccd6d73d61329c6f3a08429

Search for package or bug name: Reporting problems