CVE-2025-59351
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-09-18
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linuxfoundation | dragonfly | to 2.1.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in Dragonfly versions prior to 2.1.0, where a function's first return value is dereferenced even if the function returns an error. This can lead to a nil pointer dereference, causing the program to panic (crash). The issue is fixed in version 2.1.0.
How can this vulnerability impact me? :
The vulnerability can cause the Dragonfly system to crash unexpectedly due to a nil pointer dereference. This may lead to denial of service or interruption of file distribution and image acceleration services.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Dragonfly to version 2.1.0 or later, as this version contains the fix for the vulnerability that causes a nil dereference and code panic.