CVE-2025-60019
BaseFortify
Publication date: 2025-09-25
Last updated on: 2025-09-26
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| glib | glib-networking | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in glib-networking's OpenSSL backend where it fails to properly check the return value of memory allocation routines. This means that if the system runs out of memory, the software might attempt to write to an invalid memory location, potentially causing unexpected behavior or crashes.
How can this vulnerability impact me? :
The impact of this vulnerability is limited to availability. An out of memory condition could lead to writing to invalid memory locations, which may cause the application to crash or behave unpredictably, potentially leading to denial of service.