
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability was discovered in GNOME gvdb affecting the function gvdbtablewritecontentsasync in the file gvdb-builder.c. The vulnerability (CVE-2019-25085) was identified as a use-after-free issue that could be initiated remotely. The issue was fixed through a patch (d83587b2a364eb9a9a53be7e6a708074e252de14) released on June 27, 2019 (GNOME Commit).
The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The issue stems from a use-after-free vulnerability in the gvdbtablewritecontentsasync function, where a string was being accessed after it had already been freed, potentially leading to memory corruption. Additionally, the bug caused saved files to be empty (GNOME Commit).
The vulnerability could potentially lead to remote code execution with high impacts on confidentiality, integrity, and availability of the affected systems. The bug also caused functionality issues where files would be saved empty, affecting the normal operation of the software (NVD).
The vulnerability was fixed in the GNOME gvdb repository through commit d83587b2a364eb9a9a53be7e6a708074e252de14. Various Linux distributions have also released patches for their packages. For Debian, fixes were implemented in glib2.0 and epiphany-browser packages across multiple releases (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."