Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-3010

Опубликовано: 31 мар. 2025
Источник: debian
EPSS Низкий

Описание

A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glslangunfixedpackage

Примечания

  • Crash in CLI tool, no security impact

  • https://github.com/KhronosGroup/glslang/issues/3903

EPSS

Процентиль: 22%
0.00071
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
10 месяцев назад

A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

CVSS3: 3.3
nvd
10 месяцев назад

A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

msrc
5 месяцев назад

Khronos Group glslang Intermediate.cpp isConversionAllowed null pointer dereference

CVSS3: 3.3
github
10 месяцев назад

A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 22%
0.00071
Низкий