{"id":"AZL-6439","summary":"CVE-2021-28153 affecting package glib for versions less than 2.60.1-5","details":"An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)","modified":"2026-04-01T05:20:18.726341Z","published":"2021-03-11T22:15:12Z","upstream":["CVE-2021-28153"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28153"}],"affected":[{"package":{"name":"glib","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/glib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.60.1-5"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-6439.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}