Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-60019

Опубликовано: 25 сент. 2025
Источник: debian
EPSS Низкий

Описание

glib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib-networkingunfixedpackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib-networking/-/issues/227

  • https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/263

  • Fixed by: https://gitlab.gnome.org/GNOME/glib-networking/-/commit/70df675dd4f5e4a593b2f95406c1aac031aa8bc7

  • OpenSSL backend disabled by default upstream and in Debian

EPSS

Процентиль: 19%
0.00061
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
4 месяца назад

glib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location.

CVSS3: 3.7
nvd
4 месяца назад

glib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location.

msrc
4 месяца назад

Glib-networking: uninitialized memory dereferences on glib-networking through glib-networking/tls/openssl/gtlsbio.c via g_tls_bio_new_from_iostream() and g_tls_bio_new_from_datagram_based()

CVSS3: 3.7
github
4 месяца назад

glib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location.

CVSS3: 3.7
fstec
6 месяцев назад

Уязвимость функцим g_tls_bio_new_from_iostream() и g_tls_bio_new_from_datagram_based() библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 19%
0.00061
Низкий