Описание
A vulnerability was found in GNOME gvdb. It has been classified as critical. This affects the function gvdb_table_write_contents_async of the file gvdb-builder.c. The manipulation leads to use after free. It is possible to initiate the attack remotely. The name of the patch is d83587b2a364eb9a9a53be7e6a708074e252de14. It is recommended to apply a patch to fix this issue. The identifier VDB-216789 was assigned to this vulnerability.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | 3.28.6-0ubuntu1 |
| devel | not-affected | |
| esm-apps/bionic | not-affected | 3.28.6-0ubuntu1 |
| esm-apps/focal | not-affected | 3.36.4-0ubuntu2 |
| esm-apps/jammy | not-affected | |
| esm-apps/xenial | not-affected | |
| focal | not-affected | 3.36.4-0ubuntu2 |
| jammy | not-affected | |
| kinetic | not-affected | |
| trusty | ignored | end of standard support |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | 2.56.4-0ubuntu0.18.04.9 |
| devel | not-affected | |
| esm-infra-legacy/trusty | not-affected | |
| esm-infra/bionic | not-affected | 2.56.4-0ubuntu0.18.04.9 |
| esm-infra/focal | not-affected | 2.64.6-1~ubuntu20.04.4 |
| esm-infra/xenial | not-affected | |
| focal | not-affected | 2.64.6-1~ubuntu20.04.4 |
| jammy | not-affected | 2.72.4-0ubuntu1 |
| kinetic | not-affected | |
| trusty | ignored | end of standard support |
Показывать по
EPSS
6.3 Medium
CVSS3
Связанные уязвимости
A vulnerability was found in GNOME gvdb. It has been classified as critical. This affects the function gvdb_table_write_contents_async of the file gvdb-builder.c. The manipulation leads to use after free. It is possible to initiate the attack remotely. The name of the patch is d83587b2a364eb9a9a53be7e6a708074e252de14. It is recommended to apply a patch to fix this issue. The identifier VDB-216789 was assigned to this vulnerability.
A vulnerability was found in GNOME gvdb. It has been classified as critical. This affects the function gvdb_table_write_contents_async of the file gvdb-builder.c. The manipulation leads to use after free. It is possible to initiate the attack remotely. The name of the patch is d83587b2a364eb9a9a53be7e6a708074e252de14. It is recommended to apply a patch to fix this issue. The identifier VDB-216789 was assigned to this vulnerability.
GNOME gvdb gvdb-builder.c gvdb_table_write_contents_async use after free
A vulnerability was found in GNOME gvdb. It has been classified as cri ...
A vulnerability was found in GNOME gvdb. It has been classified as critical. This affects the function gvdb_table_write_contents_async of the file gvdb-builder.c. The manipulation leads to use after free. It is possible to initiate the attack remotely. The name of the patch is d83587b2a364eb9a9a53be7e6a708074e252de14. It is recommended to apply a patch to fix this issue. The identifier VDB-216789 was assigned to this vulnerability.
EPSS
6.3 Medium
CVSS3