Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-3010

Опубликовано: 31 мар. 2025
Источник: ubuntu
Приоритет: medium
CVSS2: 1.7
CVSS3: 3.3

Описание

A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

РелизСтатусПримечание
devel

deferred

2025-08-21
esm-apps/focal

deferred

2025-08-21
esm-apps/jammy

deferred

2025-08-21
esm-apps/noble

deferred

2025-08-21
focal

ignored

end of standard support, was needs-triage
jammy

deferred

2025-08-21
noble

deferred

2025-08-21
oracular

ignored

end of life, was needs-triage
plucky

ignored

end of life, was deferred [2025-08-21]
questing

deferred

2025-08-21

Показывать по

1.7 Low

CVSS2

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
nvd
10 месяцев назад

A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

msrc
5 месяцев назад

Khronos Group glslang Intermediate.cpp isConversionAllowed null pointer dereference

CVSS3: 3.3
debian
10 месяцев назад

A vulnerability, which was classified as problematic, has been found i ...

CVSS3: 3.3
github
10 месяцев назад

A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

1.7 Low

CVSS2

3.3 Low

CVSS3