CVE-2019-19451

MEDIUM

GNOME Dia <2019-11-27 - Info Disclosure

Title source: llm
STIX 2.1

Description

When GNOME Dia before 2019-11-27 is launched with a filename argument that is not a valid codepoint in the current encoding, it enters an endless loop, thus endlessly writing text to stdout. If this launch is from a thumbnailer service, this output will usually be written to disk via the system's logging facility (potentially with elevated privileges), thus filling up the disk and eventually rendering the system unusable. (The filename can be for a nonexistent file.) NOTE: this does not affect an upstream release, but affects certain Linux distribution packages with version numbers such as 0.97.3.

References (4)

Core 4
Core References
Vendor Advisory x_refsource_misc
https://gitlab.gnome.org/GNOME/dia/issues/428
Broken Link, Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00019.html

Scores

CVSS v3 5.5
EPSS 0.0015
EPSS Percentile 35.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-835
Status published
Products (4)
fedoraproject/fedora 32
fedoraproject/fedora 33
gnome/dia < 2019-11-27
opensuse/leap 15.1
Published Nov 29, 2019
Tracked Since Feb 18, 2026