4.9
CVSSv2

CVE-2019-19451

Published: 29/11/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

When GNOME Dia prior to 2019-11-27 is launched with a filename argument that is not a valid codepoint in the current encoding, it enters an endless loop, thus endlessly writing text to stdout. If this launch is from a thumbnailer service, this output will usually be written to disk via the system's logging facility (potentially with elevated privileges), thus filling up the disk and eventually rendering the system unusable. (The filename can be for a nonexistent file.) NOTE: this does not affect an upstream release, but affects certain Linux distribution packages with version numbers such as 0.97.3.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnome dia

fedoraproject fedora 32

fedoraproject fedora 33

opensuse leap 15.1

Vendor Advisories

Debian Bug report logs - #945876 dia: CVE-2019-19451 Package: src:dia; Maintainer for src:dia is Rodrigo Siqueira <siqueira@imeuspbr>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 30 Nov 2019 09:54:02 UTC Severity: important Tags: security, upstream Found in versions dia/0973+git20160930-82, ...
When GNOME Dia before 2019-11-27 is launched with a filename argument that is not a valid codepoint in the current encoding, it enters an endless loop, thus endlessly writing text to stdout If this launch is from a thumbnailer service, this output will usually be written to disk via the system's logging facility (potentially with elevated privileg ...