Information Exposure Affecting glib2.0 package, versions <2.58.3-2+deb10u4
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Confidentiality
High
Threat Intelligence
EPSS
0.07% (31st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-GLIB20-2993046
- published 26 Aug 2022
- disclosed 23 Aug 2022
Introduced: 23 Aug 2022
CVE-2021-3800 Open this link in a new tabHow to fix?
Upgrade Debian:10
glib2.0
to version 2.58.3-2+deb10u4 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0
package and not the glib2.0
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
References
- https://security-tracker.debian.org/tracker/CVE-2021-3800
- https://access.redhat.com/security/cve/CVE-2021-3800
- https://www.openwall.com/lists/oss-security/2017/06/23/8
- https://gitlab.gnome.org/GNOME/glib/-/commit/3529bb4450a51995
- https://bugzilla.redhat.com/show_bug.cgi?id=1938284
- https://lists.debian.org/debian-lts-announce/2022/09/msg00020.html
- https://security.netapp.com/advisory/ntap-20221028-0004/