CVE-2025-60019

NameCVE-2025-60019
Descriptionglib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glib-networking (PTS)bullseye2.66.0-2vulnerable
bookworm2.74.0-4vulnerable
forky, sid, trixie2.80.1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glib-networkingsource(unstable)(unfixed)

Notes

https://gitlab.gnome.org/GNOME/glib-networking/-/issues/227
https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/263
Fixed by: https://gitlab.gnome.org/GNOME/glib-networking/-/commit/70df675dd4f5e4a593b2f95406c1aac031aa8bc7

Search for package or bug name: Reporting problems