[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1108157: poco: CVE-2025-6375



Source: poco
Version: 1.13.0-6
Severity: important
Tags: security upstream
Forwarded: https://github.com/pocoproject/poco/issues/4915
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerability was published for poco.

CVE-2025-6375[0]:
| A vulnerability was found in poco up to 1.14.1. It has been rated as
| problematic. Affected by this issue is the function
| MultipartInputStream of the file Net/src/MultipartReader.cpp. The
| manipulation leads to null pointer dereference. The attack needs to
| be approached locally. The exploit has been disclosed to the public
| and may be used. Upgrading to version 1.14.2 is able to address this
| issue. The patch is identified as
| 6f2f85913c191ab9ddfb8fae781f5d66afccf3bf. It is recommended to
| upgrade the affected component.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-6375
    https://www.cve.org/CVERecord?id=CVE-2025-6375
[1] https://github.com/pocoproject/poco/issues/4915
[2] https://github.com/pocoproject/poco/commit/6f2f85913c191ab9ddfb8fae781f5d66afccf3bf

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore


Reply to: