Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-60018

Опубликовано: 25 сент. 2025
Источник: debian
EPSS Низкий

Описание

glib-networking's OpenSSL backend fails to properly check the return value of a call to BIO_write(), resulting in an out of bounds read.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib-networkingunfixedpackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib-networking/-/issues/226

  • https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/262

  • Fixed by: https://gitlab.gnome.org/GNOME/glib-networking/-/commit/4dd540505d40babe488404f3174ec39f49a84485

  • OpenSSL backend disabled by default upstream and in Debian

EPSS

Процентиль: 12%
0.0004
Низкий

Связанные уязвимости

CVSS3: 4.8
ubuntu
6 месяцев назад

glib-networking's OpenSSL backend fails to properly check the return value of a call to BIO_write(), resulting in an out of bounds read.

CVSS3: 4.8
redhat
8 месяцев назад

glib-networking's OpenSSL backend fails to properly check the return value of a call to BIO_write(), resulting in an out of bounds read.

CVSS3: 4.8
nvd
6 месяцев назад

glib-networking's OpenSSL backend fails to properly check the return value of a call to BIO_write(), resulting in an out of bounds read.

msrc
6 месяцев назад

Glib-networking: out of bound reads on glib-networking through tls/openssl/gtlscertificate-openssl.c via "g_tls_certificate_openssl_get_property()"

CVSS3: 4.8
github
6 месяцев назад

glib-networking's OpenSSL backend fails to properly check the return value of a call to BIO_write(), resulting in an out of bounds read.

EPSS

Процентиль: 12%
0.0004
Низкий