Home
LOW: 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:LDefault status
unaffected
2.60 (semver) before 2.80.2
affected
Default status
unaffected
Default status
unaffected
Default status
unaffected
Default status
unaffected
Default status
unaffected
Description
glib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location.
Problem types
Product status
2.60 (semver) before 2.80.2
Timeline
| 2025-09-25: | Reported to Red Hat. |
| 2025-09-15: | Made public. |
References
access.redhat.com/security/cve/CVE-2025-60019
bugzilla.redhat.com/show_bug.cgi?id=2398140 (RHBZ#2398140)
gitlab.gnome.org/GNOME/glib-networking/-/issues/227