CVE-2012-5644
https://notcve.org/view.php?id=CVE-2012-5644
libuser has information disclosure when moving user's home directory libuser, presenta una divulgación de información cuando se mueve el directorio de inicio de usuario. • http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102068.html https://access.redhat.com/security/cve/cve-2012-5644 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5644 https://security-tracker.debian.org/tracker/CVE-2012-5644 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2019-13723 – chromium-browser: use-after-free in bluetooth
https://notcve.org/view.php?id=CVE-2019-13723
Use after free in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. Un uso de la memoria previamente liberada en WebBluetooth en Google Chrome versiones anteriores a 78.0.3904.108, permitió a un atacante remoto, que había comprometido el proceso del renderizador, explotar potencialmente una corrupción de la pila por medio de una página HTML diseñada. • http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00035.html https://access.redhat.com/errata/RHSA-2019:3955 https://chromereleases.googleblog.com/2019/11/stable-channel-update-for-desktop_18.html https://crbug.com/1024121 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54XWRJ5LDFL27QXBPIBX3EHO4TPMKN4R https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/USW7PGIHNPE6W3LGY6ZDFLELQGSL52CH https://security.gentoo.org/glsa/202003- • CWE-416: Use After Free CWE-787: Out-of-bounds Write •
CVE-2012-5630
https://notcve.org/view.php?id=CVE-2012-5630
libuser 0.56 and 0.57 has a TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees. libuser versiones 0.56 y 0.57, presenta una condición de carrera TOCTOU (de tiempo de comprobación y de tiempo de uso) cuando se copia y elimina árboles de directorios. • http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102068.html https://access.redhat.com/security/cve/cve-2012-5630 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5630 https://security-tracker.debian.org/tracker/CVE-2012-5630 https://www.securityfocus.com/bid/59285 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2012-5617
https://notcve.org/view.php?id=CVE-2012-5617
gksu-polkit: permissive PolicyKit policy configuration file allows privilege escalation gksu-polkit: el archivo de configuración de política PolicyKit permisivo permite una escalada de privilegios. • http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113182.html http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113218.html http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099739.html http://www.openwall.com/lists/oss-security/2012/12/12/8 http://www.securityfocus.com/bid/56918 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5617 https://security-tracker.debian.org/tracker/CVE-2012-5617 • CWE-269: Improper Privilege Management •
CVE-2012-5535
https://notcve.org/view.php?id=CVE-2012-5535
gnome-system-log polkit policy allows arbitrary files on the system to be read La política polkit de gnome-system-log, permite leer archivos arbitrarios en el sistema. • http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094059.html http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094181.html https://access.redhat.com/security/cve/cve-2012-5535 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5535 https://security-tracker.debian.org/tracker/CVE-2012-5535 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •