Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2019-11459 CVE-2019-12795 |
CWE-ID | CWE-824 CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Red Hat CodeReady Linux Builder for IBM z Systems Operating systems & Components / Operating system Red Hat CodeReady Linux Builder for ARM 64 Operating systems & Components / Operating system Red Hat CodeReady Linux Builder for Power, little endian Operating systems & Components / Operating system Red Hat CodeReady Linux Builder for x86_64 Operating systems & Components / Operating system Red Hat Enterprise Linux for ARM 64 Operating systems & Components / Operating system Red Hat Enterprise Linux for Power, little endian Operating systems & Components / Operating system Red Hat Enterprise Linux for IBM z Systems Operating systems & Components / Operating system Red Hat Enterprise Linux for x86_64 Operating systems & Components / Operating system webkit2gtk3 (Red Hat package) Operating systems & Components / Operating system package or component wayland-protocols (Red Hat package) Operating systems & Components / Operating system package or component plymouth (Red Hat package) Operating systems & Components / Operating system package or component pidgin (Red Hat package) Operating systems & Components / Operating system package or component pango (Red Hat package) Operating systems & Components / Operating system package or component nautilus (Red Hat package) Operating systems & Components / Operating system package or component mutter (Red Hat package) Operating systems & Components / Operating system package or component mozjs60 (Red Hat package) Operating systems & Components / Operating system package or component gvfs (Red Hat package) Operating systems & Components / Operating system package or component gtk3 (Red Hat package) Operating systems & Components / Operating system package or component gsettings-desktop-schemas (Red Hat package) Operating systems & Components / Operating system package or component gnome-tweaks (Red Hat package) Operating systems & Components / Operating system package or component gnome-software (Red Hat package) Operating systems & Components / Operating system package or component gnome-shell-extensions (Red Hat package) Operating systems & Components / Operating system package or component gnome-shell (Red Hat package) Operating systems & Components / Operating system package or component gnome-settings-daemon (Red Hat package) Operating systems & Components / Operating system package or component gnome-remote-desktop (Red Hat package) Operating systems & Components / Operating system package or component gnome-desktop3 (Red Hat package) Operating systems & Components / Operating system package or component gnome-control-center (Red Hat package) Operating systems & Components / Operating system package or component gjs (Red Hat package) Operating systems & Components / Operating system package or component gdm (Red Hat package) Operating systems & Components / Operating system package or component gdk-pixbuf2 (Red Hat package) Operating systems & Components / Operating system package or component file-roller (Red Hat package) Operating systems & Components / Operating system package or component evince (Red Hat package) Operating systems & Components / Operating system package or component chrome-gnome-shell (Red Hat package) Operating systems & Components / Operating system package or component baobab (Red Hat package) Operating systems & Components / Operating system package or component appstream-data (Red Hat package) Operating systems & Components / Operating system package or component accountsservice (Red Hat package) Operating systems & Components / Operating system package or component SDL (Red Hat package) Operating systems & Components / Operating system package or component |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU29244
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-11459
CWE-ID:
CWE-824 - Access of Uninitialized Pointer
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due tothe TIFFReadRGBAImageOriented() function called from tiff_document_render() and tiff_document_get_thumbnail() functions in the backend/tiff/tiff-document.c in GNOME Evince returns uninitialized memory instead of false, when failing to read an image. A remote attacker can gain access to sensitive information on the system.
Install updates from vendor's website.
Red Hat CodeReady Linux Builder for IBM z Systems: 8.0
Red Hat CodeReady Linux Builder for ARM 64: 8.0
Red Hat CodeReady Linux Builder for Power, little endian: 8.0
Red Hat CodeReady Linux Builder for x86_64: 8.0
Red Hat Enterprise Linux for ARM 64: 8
Red Hat Enterprise Linux for Power, little endian: 8
Red Hat Enterprise Linux for IBM z Systems: 8
Red Hat Enterprise Linux for x86_64: 8.0
webkit2gtk3 (Red Hat package): before 2.24.3-1.el8
wayland-protocols (Red Hat package): before 1.17-1.el8
plymouth (Red Hat package): before 0.9.3-15.el8
pidgin (Red Hat package): before 2.13.0-5.el8
pango (Red Hat package): before 1.42.4-6.el8
nautilus (Red Hat package): before 3.28.1-10.el8
mutter (Red Hat package): before 3.32.2-10.el8
mozjs60 (Red Hat package): before 60.9.0-3.el8
gvfs (Red Hat package): before 1.36.2-6.el8
gtk3 (Red Hat package): before 3.22.30-4.el8
gsettings-desktop-schemas (Red Hat package): before 3.32.0-3.el8
gnome-tweaks (Red Hat package): before 3.28.1-6.el8
gnome-software (Red Hat package): before 3.30.6-2.el8
gnome-shell-extensions (Red Hat package): before 3.32.1-10.el8
gnome-shell (Red Hat package): before 3.32.2-9.el8
gnome-settings-daemon (Red Hat package): before 3.32.0-4.el8
gnome-remote-desktop (Red Hat package): before 0.1.6-5.el8
gnome-desktop3 (Red Hat package): before 3.32.2-1.el8
gnome-control-center (Red Hat package): before 3.28.2-5.el8
gjs (Red Hat package): before 1.56.2-3.el8
gdm (Red Hat package): before 3.28.3-22.el8
gdk-pixbuf2 (Red Hat package): before 2.36.12-5.el8
file-roller (Red Hat package): before 3.28.1-2.el8
evince (Red Hat package): before 3.28.4-3.el8
chrome-gnome-shell (Red Hat package): before 10.1-6.el8
baobab (Red Hat package): before 3.28.0-2.el8
appstream-data (Red Hat package): before 8-20190805.el8
accountsservice (Red Hat package): before 0.6.50-7.el8
SDL (Red Hat package): before 1.2.15-35.el8
CPE2.3https://access.redhat.com/errata/RHSA-2019:3553
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU18791
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-12795
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to escalate privileges on the system.
The vulnerability exists due to the daemon/gvfsdaemon.c opened a private D-Bus server socket without configuring an authorization rule. A local attacker can connect to this server socket and issue D-Bus method calls.
MitigationInstall updates from vendor's website.
Red Hat CodeReady Linux Builder for IBM z Systems: 8.0
Red Hat CodeReady Linux Builder for ARM 64: 8.0
Red Hat CodeReady Linux Builder for Power, little endian: 8.0
Red Hat CodeReady Linux Builder for x86_64: 8.0
Red Hat Enterprise Linux for ARM 64: 8
Red Hat Enterprise Linux for Power, little endian: 8
Red Hat Enterprise Linux for IBM z Systems: 8
Red Hat Enterprise Linux for x86_64: 8.0
webkit2gtk3 (Red Hat package): before 2.24.3-1.el8
wayland-protocols (Red Hat package): before 1.17-1.el8
plymouth (Red Hat package): before 0.9.3-15.el8
pidgin (Red Hat package): before 2.13.0-5.el8
pango (Red Hat package): before 1.42.4-6.el8
nautilus (Red Hat package): before 3.28.1-10.el8
mutter (Red Hat package): before 3.32.2-10.el8
mozjs60 (Red Hat package): before 60.9.0-3.el8
gvfs (Red Hat package): before 1.36.2-6.el8
gtk3 (Red Hat package): before 3.22.30-4.el8
gsettings-desktop-schemas (Red Hat package): before 3.32.0-3.el8
gnome-tweaks (Red Hat package): before 3.28.1-6.el8
gnome-software (Red Hat package): before 3.30.6-2.el8
gnome-shell-extensions (Red Hat package): before 3.32.1-10.el8
gnome-shell (Red Hat package): before 3.32.2-9.el8
gnome-settings-daemon (Red Hat package): before 3.32.0-4.el8
gnome-remote-desktop (Red Hat package): before 0.1.6-5.el8
gnome-desktop3 (Red Hat package): before 3.32.2-1.el8
gnome-control-center (Red Hat package): before 3.28.2-5.el8
gjs (Red Hat package): before 1.56.2-3.el8
gdm (Red Hat package): before 3.28.3-22.el8
gdk-pixbuf2 (Red Hat package): before 2.36.12-5.el8
file-roller (Red Hat package): before 3.28.1-2.el8
evince (Red Hat package): before 3.28.4-3.el8
chrome-gnome-shell (Red Hat package): before 10.1-6.el8
baobab (Red Hat package): before 3.28.0-2.el8
appstream-data (Red Hat package): before 8-20190805.el8
accountsservice (Red Hat package): before 0.6.50-7.el8
SDL (Red Hat package): before 1.2.15-35.el8
CPE2.3https://access.redhat.com/errata/RHSA-2019:3553
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.