Show filters
309 Total Results
Displaying 51-60 of 309
Sort by:
Attacker Value
Unknown

CVE-2021-3349

Disclosure Date: February 01, 2021 (last updated February 22, 2025)
GNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior
Attacker Value
Unknown

CVE-2020-27837

Disclosure Date: December 28, 2020 (last updated February 22, 2025)
A flaw was found in GDM in versions prior to 3.38.2.1. A race condition in the handling of session shutdown makes it possible to bypass the lock screen for a user that has autologin enabled, accessing their session without authentication. This is similar to CVE-2017-12164, but requires more difficult conditions to exploit.
Attacker Value
Unknown

CVE-2020-29385

Disclosure Date: December 26, 2020 (last updated February 22, 2025)
GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self->code_table[11].extends to c, which will give the value of 10. This will make the loop run infinitely. This bug can, for example, be triggered by calling this function with a GIF image with LZW compression that is crafted in a special way.
Attacker Value
Unknown

CVE-2020-35457

Disclosure Date: December 14, 2020 (last updated February 22, 2025)
GNOME GLib before 2.65.3 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries. NOTE: the vendor's position is "Realistically this is not a security issue. The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()." The researcher states that this pattern is undocumented
Attacker Value
Unknown

CVE-2020-16125

Disclosure Date: November 06, 2020 (last updated February 22, 2025)
gdm3 versions before 3.36.2 or 3.38.2 would start gnome-initial-setup if gdm3 can't contact the accountservice service via dbus in a timely manner; on Ubuntu (and potentially derivatives) this could be be chained with an additional issue that could allow a local user to create a new privileged account.
Attacker Value
Unknown

CVE-2020-24661

Disclosure Date: August 26, 2020 (last updated February 22, 2025)
GNOME Geary before 3.36.3 mishandles pinned TLS certificate verification for IMAP and SMTP services using invalid TLS certificates (e.g., self-signed certificates) when the client system is not configured to use a system-provided PKCS#11 store. This allows a meddler in the middle to present a different invalid certificate to intercept incoming and outgoing mail.
Attacker Value
Unknown

CVE-2020-17489

Disclosure Date: August 11, 2020 (last updated February 21, 2025)
An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible for a brief moment upon a logout. (If the password were never shown in cleartext, only the password length is revealed.)
Attacker Value
Unknown

CVE-2020-16117

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
In GNOME evolution-data-server before 3.35.91, a malicious server can crash the mail client with a NULL pointer dereference by sending an invalid (e.g., minimal) CAPABILITY line on a connection attempt. This is related to imapx_free_capability and imapx_connect_to_server.
Attacker Value
Unknown

CVE-2020-16118

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
In GNOME Balsa before 2.6.0, a malicious server operator or man in the middle can trigger a NULL pointer dereference and client crash by sending a PREAUTH response to imap_mbox_connect in libbalsa/imap/imap-handle.c.
Attacker Value
Unknown

CVE-2020-14928

Disclosure Date: July 17, 2020 (last updated February 21, 2025)
evolution-data-server (eds) through 3.36.3 has a STARTTLS buffering issue that affects SMTP and POP3. When a server sends a "begin TLS" response, eds reads additional data and evaluates it in a TLS context, aka "response injection."