A vulnerability was found in GNOME gvdb. It has been classified as critical. This affects the function gvdbtablewritecontentsasync of the file gvdb-builder.c. The manipulation leads to use after free. It is possible to initiate the attack remotely. The name of the patch is d83587b2a364eb9a9a53be7e6a708074e252de14. It is recommended to apply a patch to fix this issue. The identifier VDB-216789 was assigned to this vulnerability.
[
{
"digest": {
"function_hash": "301277711496475568035963244595542735363",
"length": 867.0
},
"id": "CVE-2019-25085-291b4f4e",
"signature_type": "Function",
"source": "https://github.com/gnome/gvdb/commit/d83587b2a364eb9a9a53be7e6a708074e252de14",
"deprecated": false,
"target": {
"function": "gvdb_table_write_contents_async",
"file": "gvdb-builder.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"53415547359747588979283348056607276254",
"25056126297270535278980612097205162906",
"130776683794180994835819468440474177922",
"118828692746359101136333284646150379250"
]
},
"id": "CVE-2019-25085-cf050352",
"signature_type": "Line",
"source": "https://github.com/gnome/gvdb/commit/d83587b2a364eb9a9a53be7e6a708074e252de14",
"deprecated": false,
"target": {
"file": "gvdb-builder.c"
},
"signature_version": "v1"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-25085.json"
"2026-04-11T09:40:07Z"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2019-06-27"
}
]
}
]