Home

Description

A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-11 | Updated 2026-05-20 | Assigner redhat




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Problem types

Integer Overflow or Wraparound

Product status

Default status
unaffected

Any version before 2.86.3
affected

Default status
affected

0:2.80.4-10.el10_1.13 (rpm) before *
unaffected

Default status
affected

0:2.80.4-12.el10_2.13 (rpm) before *
unaffected

Default status
affected

0:2.56.4-169.el8_10 (rpm) before *
unaffected

Default status
affected

0:2.56.4-165.el8_8 (rpm) before *
unaffected

Default status
affected

0:2.56.4-165.el8_8 (rpm) before *
unaffected

Default status
affected

0:2.68.4-18.el9_7.2 (rpm) before *
unaffected

Default status
affected

0:2.68.4-19.el9_8.1 (rpm) before *
unaffected

Default status
affected

0:2.68.4-18.el9_7.2 (rpm) before *
unaffected

Default status
affected

0:2.68.4-19.el9_8.1 (rpm) before *
unaffected

Default status
affected

0:2.68.4-5.el9_0.5 (rpm) before *
unaffected

Default status
affected

0:2.68.4-7.el9_2.5 (rpm) before *
unaffected

Default status
affected

0:2.68.4-14.el9_4.6 (rpm) before *
unaffected

Default status
affected

0:2.68.4-16.el9_6.5 (rpm) before *
unaffected

Default status
affected

2.88.0-1.1.hum1 (rpm) before *
unaffected

Default status
affected

Default status
unknown

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2025-12-11:Reported to Red Hat.
2025-12-11:Made public.

Credits

Red Hat would like to thank Codean Labs for reporting this issue.

References

access.redhat.com/errata/RHSA-2026:15953 (RHSA-2026:15953) vendor-advisory

access.redhat.com/errata/RHSA-2026:15969 (RHSA-2026:15969) vendor-advisory

access.redhat.com/errata/RHSA-2026:15971 (RHSA-2026:15971) vendor-advisory

access.redhat.com/errata/RHSA-2026:19148 (RHSA-2026:19148) vendor-advisory

access.redhat.com/errata/RHSA-2026:19361 (RHSA-2026:19361) vendor-advisory

access.redhat.com/errata/RHSA-2026:19452 (RHSA-2026:19452) vendor-advisory

access.redhat.com/errata/RHSA-2026:19457 (RHSA-2026:19457) vendor-advisory

access.redhat.com/errata/RHSA-2026:19459 (RHSA-2026:19459) vendor-advisory

access.redhat.com/errata/RHSA-2026:19460 (RHSA-2026:19460) vendor-advisory

access.redhat.com/errata/RHSA-2026:19523 (RHSA-2026:19523) vendor-advisory

access.redhat.com/errata/RHSA-2026:7461 (RHSA-2026:7461) vendor-advisory

access.redhat.com/security/cve/CVE-2025-14512 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2421339 (RHBZ#2421339) issue-tracking

gitlab.gnome.org/GNOME/glib/-/issues/3845

cve.org (CVE-2025-14512)

nvd.nist.gov (CVE-2025-14512)

Download JSON