Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-8733

Опубликовано: 08 авг. 2025
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 1.7
CVSS3: 3.3

Описание

A vulnerability was found in GNU Bison up to 3.8.2. It has been rated as problematic. This issue affects the function __obstack_vprintf_internal of the file obprintf.c. The manipulation leads to reachable assertion. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

РелизСтатусПримечание
devel

needs-triage

esm-infra/bionic

needs-triage

esm-infra/focal

needs-triage

esm-infra/xenial

needs-triage

jammy

needs-triage

noble

needs-triage

plucky

needs-triage

upstream

needs-triage

Показывать по

EPSS

Процентиль: 2%
0.00014
Низкий

1.7 Low

CVSS2

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
redhat
22 дня назад

A flaw has been found in GNU Bison up to 3.8.2. This affects the function __obstack_vprintf_internal of the file obprintf.c. Executing manipulation can lead to reachable assertion. The attack requires local access. The exploit has been published and may be used. It is still unclear if this vulnerability genuinely exists. The issue could not be reproduced from a GNU Bison 3.8.2 tarball run in a Fedora 42 container.

CVSS3: 3.3
nvd
22 дня назад

A flaw has been found in GNU Bison up to 3.8.2. This affects the function __obstack_vprintf_internal of the file obprintf.c. Executing manipulation can lead to reachable assertion. The attack requires local access. The exploit has been published and may be used. It is still unclear if this vulnerability genuinely exists. The issue could not be reproduced from a GNU Bison 3.8.2 tarball run in a Fedora 42 container.

CVSS3: 3.3
debian
22 дня назад

A flaw has been found in GNU Bison up to 3.8.2. This affects the funct ...

CVSS3: 3.3
github
22 дня назад

A vulnerability was found in GNU Bison up to 3.8.2. It has been rated as problematic. This issue affects the function __obstack_vprintf_internal of the file obprintf.c. The manipulation leads to reachable assertion. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 2%
0.00014
Низкий

1.7 Low

CVSS2

3.3 Low

CVSS3