Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:0975

Опубликовано: 24 янв. 2026
Источник: rocky
Оценка: Moderate

Описание

Moderate: glib2 security update

GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.

Security Fix(es):

  • glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 10

НаименованиеАрхитектураРелизRPM
glib2x86_6410.el10_1.12glib2-2.80.4-10.el10_1.12.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7.7
ubuntu
2 месяца назад

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

CVSS3: 7.7
nvd
2 месяца назад

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

CVSS3: 7.7
msrc
2 месяца назад

Glib: integer overflow in in g_escape_uri_string()

CVSS3: 7.7
debian
2 месяца назад

A heap-based buffer overflow problem was found in glib through an inco ...

rocky
15 дней назад

Moderate: glib2 security update