Source: glib-networking Version: 2.80.1-1 Severity: important Tags: security upstream Forwarded: https://gitlab.gnome.org/GNOME/glib-networking/-/issues/227 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for glib-networking. CVE-2025-60019[0]: | glib-networking's OpenSSL backend fails to properly check the return | value of memory allocation routines. An out of memory condition | could potentially result in writing to an invalid memory location. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-60019 https://www.cve.org/CVERecord?id=CVE-2025-60019 [1] https://gitlab.gnome.org/GNOME/glib-networking/-/issues/227 [2] https://gitlab.gnome.org/GNOME/glib-networking/-/merge_requests/263 [3] https://gitlab.gnome.org/GNOME/glib-networking/-/commit/70df675dd4f5e4a593b2f95406c1aac031aa8bc7 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

