Home

Description

A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-11 | Updated 2025-12-11 | Assigner redhat




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Problem types

Integer Overflow or Wraparound

Product status

Default status
affected

Default status
affected

Default status
unknown

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2025-12-11:Reported to Red Hat.
2025-12-11:Made public.

Credits

Red Hat would like to thank Codean Labs for reporting this issue.

References

access.redhat.com/security/cve/CVE-2025-14512 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2421339 (RHBZ#2421339) issue-tracking

cve.org (CVE-2025-14512)

nvd.nist.gov (CVE-2025-14512)

Download JSON