Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2026:20018-1

Опубликовано: 12 янв. 2026
Источник: suse-cvrf

Описание

Security update for glib2

This update for glib2 fixes the following issues:

Update to version 2.84.4.

Security issues fixed:

  • CVE-2025-14512: integer overflow in the GIO escape_byte_string() function when processing malicious files or remote filesystem attribute values can lead to denial-of-service (bsc#1254878).
  • CVE-2025-14087: buffer underflow in the GVariant parser bytestring_parse() and string_parse() functions when processing attacker-influenced data may lead to crash or code execution (bsc#1254662).
  • CVE-2025-13601: heap-based buffer overflow in the g_escape_uri_string() function when processing strings with a large number of unacceptable characters may lead to crash or code execution (bsc#1254297).
  • CVE-2025-7039: integer overflow when creating temporary files may lead to an out-of-bounds memory access that can be used for path traversal or exposure of sensitive content in a temporary file (bsc#1249055).

Other issues fixed and changes:

  • Fix GFile leak in g_local_file_set_display_name during error handling.
  • Fix incorrect output parameter handling in closure helper of g_settings_bind_with_mapping_closures.
  • gfileutils: fix computation of temporary file name.
  • Fix GFile leak in g_local_file_set_display_name().
  • gthreadpool: catch pool_spawner creation failure.
  • gio/filenamecompleter: fix leaks.
  • gfilenamecompleter: fix g_object_unref() of undefined value.

Список пакетов

openSUSE Leap 16.0
gio-branding-upstream-2.84.4-160000.1.1
glib2-devel-2.84.4-160000.1.1
glib2-devel-static-2.84.4-160000.1.1
glib2-doc-2.84.4-160000.1.1
glib2-lang-2.84.4-160000.1.1
glib2-tests-devel-2.84.4-160000.1.1
glib2-tools-2.84.4-160000.1.1
libgio-2_0-0-2.84.4-160000.1.1
libgirepository-2_0-0-2.84.4-160000.1.1
libglib-2_0-0-2.84.4-160000.1.1
libgmodule-2_0-0-2.84.4-160000.1.1
libgobject-2_0-0-2.84.4-160000.1.1
libgthread-2_0-0-2.84.4-160000.1.1
typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1
typelib-1_0-GLib-2_0-2.84.4-160000.1.1
typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1
typelib-1_0-GModule-2_0-2.84.4-160000.1.1
typelib-1_0-GObject-2_0-2.84.4-160000.1.1
typelib-1_0-Gio-2_0-2.84.4-160000.1.1

Описание

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.


Затронутые продукты
openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1

Ссылки

Описание

A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.


Затронутые продукты
openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1

Ссылки

Описание

A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.


Затронутые продукты
openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1

Ссылки

Описание

A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.


Затронутые продукты
openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1
openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1

Ссылки
Уязвимость openSUSE-SU-2026:20018-1