Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-19451

Опубликовано: 29 нояб. 2019
Источник: debian
EPSS Низкий

Описание

When GNOME Dia before 2019-11-27 is launched with a filename argument that is not a valid codepoint in the current encoding, it enters an endless loop, thus endlessly writing text to stdout. If this launch is from a thumbnailer service, this output will usually be written to disk via the system's logging facility (potentially with elevated privileges), thus filling up the disk and eventually rendering the system unusable. (The filename can be for a nonexistent file.) NOTE: this does not affect an upstream release, but affects certain Linux distribution packages with version numbers such as 0.97.3.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
diafixed0.97.3+git20220525-1package

Примечания

  • https://gitlab.gnome.org/GNOME/dia/issues/428

  • Introduced by: https://gitlab.gnome.org/GNOME/dia/commit/9a5f438d4b3e718c8ab0efe01d08ee2c3a0d9a86

  • Fixed by: https://gitlab.gnome.org/GNOME/dia/commit/baa2df853f9fb770eedcf3d94c7f5becebc90bb9

  • Negligible security impact, hang in end user tool

EPSS

Процентиль: 36%
0.00153
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 6 лет назад

When GNOME Dia before 2019-11-27 is launched with a filename argument that is not a valid codepoint in the current encoding, it enters an endless loop, thus endlessly writing text to stdout. If this launch is from a thumbnailer service, this output will usually be written to disk via the system's logging facility (potentially with elevated privileges), thus filling up the disk and eventually rendering the system unusable. (The filename can be for a nonexistent file.) NOTE: this does not affect an upstream release, but affects certain Linux distribution packages with version numbers such as 0.97.3.

CVSS3: 5.5
nvd
около 6 лет назад

When GNOME Dia before 2019-11-27 is launched with a filename argument that is not a valid codepoint in the current encoding, it enters an endless loop, thus endlessly writing text to stdout. If this launch is from a thumbnailer service, this output will usually be written to disk via the system's logging facility (potentially with elevated privileges), thus filling up the disk and eventually rendering the system unusable. (The filename can be for a nonexistent file.) NOTE: this does not affect an upstream release, but affects certain Linux distribution packages with version numbers such as 0.97.3.

suse-cvrf
около 6 лет назад

Security update for dia

suse-cvrf
около 6 лет назад

Security update for dia

suse-cvrf
около 6 лет назад

Security update for dia

EPSS

Процентиль: 36%
0.00153
Низкий