Advisories ยป MGASA-2021-0162

Updated glib2.0 packages fix security vulnerability

Publication date: 30 Mar 2021
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-28153


An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace()
is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is
a dangling symlink, it incorrectly also creates the target of the symlink
as an empty file, which could conceivably have security relevance if the
symlink is attacker-controlled. (If the path is a symlink to a file that
already exists, then the contents of that file correctly remain unchanged.)