Show filters
309 Total Results
Displaying 91-100 of 309
Sort by:
Attacker Value
Unknown

CVE-2019-12447

Disclosure Date: May 29, 2019 (last updated November 08, 2023)
An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.
Attacker Value
Unknown

CVE-2019-12448

Disclosure Date: May 29, 2019 (last updated November 08, 2023)
An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn't implement query_info_on_read/write.
0
Attacker Value
Unknown

CVE-2019-12449

Disclosure Date: May 29, 2019 (last updated November 08, 2023)
An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles a file's user and group ownership during move (and copy with G_FILE_COPY_ALL_METADATA) operations from admin:// to file:// URIs, because root privileges are unavailable.
Attacker Value
Unknown

CVE-2019-11459

Disclosure Date: April 22, 2019 (last updated November 08, 2023)
The tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend in GNOME Evince through 3.32.0 did not handle errors from TIFFReadRGBAImageOriented(), leading to uninitialized memory use when processing certain TIFF image files.
Attacker Value
Unknown

CVE-2019-11460

Disclosure Date: April 22, 2019 (last updated November 08, 2023)
An issue was discovered in GNOME gnome-desktop 3.26, 3.28, and 3.30 prior to 3.30.2.2, and 3.32 prior to 3.32.1.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer's controlling terminal, allowing an attacker to escape the sandbox if the thumbnailer has a controlling terminal. This is due to improper filtering of the TIOCSTI ioctl on 64-bit systems, similar to CVE-2019-10063.
0
Attacker Value
Unknown

CVE-2019-11461

Disclosure Date: April 22, 2019 (last updated November 27, 2024)
An issue was discovered in GNOME Nautilus 3.30 prior to 3.30.6 and 3.32 prior to 3.32.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer's controlling terminal, allowing an attacker to escape the sandbox if the thumbnailer has a controlling terminal. This is due to improper filtering of the TIOCSTI ioctl on 64-bit systems, similar to CVE-2019-10063.
0
Attacker Value
Unknown

CVE-2019-3827

Disclosure Date: March 25, 2019 (last updated November 27, 2024)
An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.
Attacker Value
Unknown

CVE-2019-9633

Disclosure Date: March 08, 2019 (last updated November 27, 2024)
gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrated by GNOME Web (aka Epiphany).
0
Attacker Value
Unknown

CVE-2017-12447

Disclosure Date: March 07, 2019 (last updated November 27, 2024)
GdkPixBuf (aka gdk-pixbuf), possibly 2.32.2, as used by GNOME Nautilus 3.14.3 on Ubuntu 16.04, allows attackers to cause a denial of service (stack corruption) or possibly have unspecified other impact via a crafted file folder.
0
Attacker Value
Unknown

CVE-2018-20781

Disclosure Date: February 12, 2019 (last updated November 27, 2024)
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.