Home
MEDIUM: 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HDefault status
affected
Default status
affected
Default status
unknown
Default status
affected
Default status
affected
Default status
affected
Default status
affected
Default status
affected
Default status
affected
Description
A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
Problem types
Integer Overflow or Wraparound
Product status
Timeline
| 2025-12-11: | Reported to Red Hat. |
| 2025-12-11: | Made public. |
Credits
Red Hat would like to thank Codean Labs for reporting this issue.
References
access.redhat.com/security/cve/CVE-2025-14512
bugzilla.redhat.com/show_bug.cgi?id=2421339 (RHBZ#2421339)