Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-3010

Опубликовано: 31 мар. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 1.7
CVSS3: 3.3

Описание

A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

РелизСтатусПримечание
devel

deferred

2025-08-21
esm-apps/focal

deferred

2025-08-21
esm-apps/jammy

deferred

2025-08-21
esm-apps/noble

deferred

2025-08-21
focal

ignored

end of standard support, was needs-triage
jammy

deferred

2025-08-21
noble

deferred

2025-08-21
oracular

ignored

end of life, was needs-triage
plucky

ignored

end of life, was deferred [2025-08-21]
questing

deferred

2025-08-21

Показывать по

EPSS

Процентиль: 22%
0.00071
Низкий

1.7 Low

CVSS2

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
nvd
10 месяцев назад

A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

msrc
5 месяцев назад

Khronos Group glslang Intermediate.cpp isConversionAllowed null pointer dereference

CVSS3: 3.3
debian
10 месяцев назад

A vulnerability, which was classified as problematic, has been found i ...

CVSS3: 3.3
github
10 месяцев назад

A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 22%
0.00071
Низкий

1.7 Low

CVSS2

3.3 Low

CVSS3