Vulnerability Description
gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrated by GNOME Web (aka Epiphany).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnome | Glib | 2.59.2 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/107391Third Party AdvisoryVDB Entry
- https://gitlab.gnome.org/GNOME/glib/issues/1649Vendor Advisory
- http://www.securityfocus.com/bid/107391Third Party AdvisoryVDB Entry
- https://gitlab.gnome.org/GNOME/glib/issues/1649Vendor Advisory
FAQ
What is CVE-2019-9633?
CVE-2019-9633 is a vulnerability with a CVSS score of 6.5 (MEDIUM). gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial ...
How severe is CVE-2019-9633?
CVE-2019-9633 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9633?
Check the references section above for vendor advisories and patch information. Affected products include: Gnome Glib.