Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-60019

Опубликовано: 25 сент. 2025
Источник: debian
EPSS Низкий

Описание

glib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib-networkingunfixedpackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib-networking/-/issues/227

  • https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/263

  • Fixed by: https://gitlab.gnome.org/GNOME/glib-networking/-/commit/70df675dd4f5e4a593b2f95406c1aac031aa8bc7

  • OpenSSL backend disabled by default upstream and in Debian

EPSS

Процентиль: 12%
0.00041
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
22 дня назад

glib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location.

CVSS3: 3.7
nvd
22 дня назад

glib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location.

msrc
19 дней назад

Glib-networking: uninitialized memory dereferences on glib-networking through glib-networking/tls/openssl/gtlsbio.c via g_tls_bio_new_from_iostream() and g_tls_bio_new_from_datagram_based()

CVSS3: 3.7
github
22 дня назад

glib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location.

EPSS

Процентиль: 12%
0.00041
Низкий