CVE-2025-14512

NameCVE-2025-14512
DescriptionA flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1122346

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glib2.0 (PTS)bullseye2.66.8-1+deb11u4vulnerable
bullseye (security)2.66.8-1+deb11u6vulnerable
bookworm2.74.6-2+deb12u7vulnerable
bookworm (security)2.74.6-2+deb12u2vulnerable
trixie2.84.4-3~deb13u1vulnerable
forky2.86.2-1vulnerable
sid2.86.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glib2.0source(unstable)2.86.3-11122346

Notes

[trixie] - glib2.0 <no-dsa> (Minor issue)
[bookworm] - glib2.0 <no-dsa> (Minor issue)
https://gitlab.gnome.org/GNOME/glib/-/issues/3845
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4935
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4936
Fixed by: https://gitlab.gnome.org/GNOME/glib/-/commit/4f0399c0aaf3ffc86b5625424580294bc7460404 (2.86.3)

Search for package or bug name: Reporting problems