DEBIAN-CVE-2025-6375

Source
https://security-tracker.debian.org/tracker/CVE-2025-6375
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6375.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-6375
Upstream
Published
2025-06-21T01:15:29.463Z
Modified
2025-11-20T10:18:27.294496Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in poco up to 1.14.1. It has been rated as problematic. Affected by this issue is the function MultipartInputStream of the file Net/src/MultipartReader.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.14.2 is able to address this issue. The patch is identified as 6f2f85913c191ab9ddfb8fae781f5d66afccf3bf. It is recommended to upgrade the affected component.

References

Affected packages

Debian:11 / poco

Package

Name
poco
Purl
pkg:deb/debian/poco?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.10.0-6
1.10.0-6+deb11u1
1.10.0-6+deb11u2
1.11.0-1
1.11.0-2
1.11.0-3
1.11.0-3+hurd.1
1.11.0-4
1.11.0-4.1
1.13.0-1
1.13.0-2
1.13.0-3
1.13.0-4
1.13.0-5
1.13.0-6
1.14.2-1
1.14.2-2
1.14.2-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6375.json"

Debian:12 / poco

Package

Name
poco
Purl
pkg:deb/debian/poco?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.11.0-3
1.11.0-3+deb12u1
1.11.0-3+hurd.1
1.11.0-4
1.11.0-4.1
1.13.0-1
1.13.0-2
1.13.0-3
1.13.0-4
1.13.0-5
1.13.0-6
1.14.2-1
1.14.2-2
1.14.2-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6375.json"

Debian:13 / poco

Package

Name
poco
Purl
pkg:deb/debian/poco?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.13.0-6
1.14.2-1
1.14.2-2
1.14.2-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6375.json"

Debian:14 / poco

Package

Name
poco
Purl
pkg:deb/debian/poco?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.14.2-2

Affected versions

1.*
1.13.0-6
1.14.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-6375.json"