CVE-2025-14512

NameCVE-2025-14512
DescriptionA flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4412-1
Debian Bugs1122346

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glib2.0 (PTS)bullseye2.66.8-1+deb11u4vulnerable
bullseye (security)2.66.8-1+deb11u7fixed
bookworm2.74.6-2+deb12u8fixed
bookworm (security)2.74.6-2+deb12u2vulnerable
trixie2.84.4-3~deb13u2fixed
forky, sid2.86.3-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glib2.0sourcebullseye2.66.8-1+deb11u7DLA-4412-1
glib2.0sourcebookworm2.74.6-2+deb12u8
glib2.0sourcetrixie2.84.4-3~deb13u2
glib2.0source(unstable)2.86.3-11122346

Notes

https://gitlab.gnome.org/GNOME/glib/-/issues/3845
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4935
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4936
Fixed by: https://gitlab.gnome.org/GNOME/glib/-/commit/4f0399c0aaf3ffc86b5625424580294bc7460404 (2.86.3)

Search for package or bug name: Reporting problems