First published: Fri Mar 08 2019(Updated: )
gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrated by GNOME Web (aka Epiphany).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME GLib | =2.59.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9633 is a vulnerability in GNOME GLib 2.59.2 that allows remote attackers to cause a denial of service and application crash.
CVE-2019-9633 can cause a denial of service and application crash in GNOME GLib 2.59.2.
CVE-2019-9633 has a severity rating of medium with a score of 6.5.
To fix CVE-2019-9633 in GNOME GLib 2.59.2, it is recommended to update to a patched version of the software.
You can find more information about CVE-2019-9633 on the following websites: http://www.securityfocus.com/bid/107391, https://gitlab.gnome.org/GNOME/glib/issues/1649