Описание
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | mingw-glib2 | Affected | ||
| Red Hat Enterprise Linux 6 | glib2 | Out of support scope | ||
| Red Hat Enterprise Linux 8 | mingw-glib2 | Will not fix | ||
| Red Hat Enterprise Linux 9 | mingw-glib2 | Affected | ||
| Red Hat Enterprise Linux 10 | glib2 | Fixed | RHSA-2026:0975 | 22.01.2026 |
| Red Hat Enterprise Linux 10.0 Extended Update Support | glib2 | Fixed | RHSA-2026:1327 | 27.01.2026 |
| Red Hat Enterprise Linux 7 Extended Lifecycle Support | glib2 | Fixed | RHSA-2026:1608 | 02.02.2026 |
| Red Hat Enterprise Linux 8 | glib2 | Fixed | RHSA-2026:0991 | 22.01.2026 |
| Red Hat Enterprise Linux 8.2 Advanced Update Support | glib2 | Fixed | RHSA-2026:1627 | 02.02.2026 |
| Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | glib2 | Fixed | RHSA-2026:1626 | 02.02.2026 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.7 High
CVSS3
Связанные уязвимости
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
A heap-based buffer overflow problem was found in glib through an inco ...
EPSS
7.7 High
CVSS3