Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2020:1766

Опубликовано: 28 апр. 2020
Источник: rocky
Оценка: Moderate

Описание

Moderate: GNOME security, bug fix, and enhancement update

GNOME is the default desktop environment of Rocky Linux.

Security Fix(es):

  • LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)

  • gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)

  • gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)

  • gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)

  • gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
mozjs52x86_642.el8mozjs52-52.9.0-2.el8.x86_64.rpm
mozjs60x86_644.el8mozjs60-60.9.0-4.el8.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
около 5 лет назад

ELSA-2020-1766: GNOME security, bug fix, and enhancement update (MODERATE)

suse-cvrf
почти 6 лет назад

Security update for gvfs

suse-cvrf
почти 6 лет назад

Security update for gvfs

suse-cvrf
почти 6 лет назад

Security update for gvfs

CVSS3: 8.8
ubuntu
больше 6 лет назад

There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.