Home

Description

glib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location.

PUBLISHED Reserved 2025-09-24 | Published 2025-09-25 | Updated 2025-09-25 | Assigner redhat




LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

NULL Pointer Dereference

Product status

Default status
unaffected

2.60 before 2.80.2
affected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Timeline

2025-09-25:Reported to Red Hat.
2025-09-15:Made public.

References

access.redhat.com/security/cve/CVE-2025-60019 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2398140 (RHBZ#2398140) issue-tracking

gitlab.gnome.org/GNOME/glib-networking/-/issues/227

cve.org (CVE-2025-60019)

nvd.nist.gov (CVE-2025-60019)

Download JSON