Описание
Security update for glib2
This update for glib2 fixes the following issues:
Update to version 2.84.4.
Security issues fixed:
- CVE-2025-14512: integer overflow in the GIO
escape_byte_string()function when processing malicious files or remote filesystem attribute values can lead to denial-of-service (bsc#1254878). - CVE-2025-14087: buffer underflow in the GVariant parser
bytestring_parse()andstring_parse()functions when processing attacker-influenced data may lead to crash or code execution (bsc#1254662). - CVE-2025-13601: heap-based buffer overflow in the
g_escape_uri_string()function when processing strings with a large number of unacceptable characters may lead to crash or code execution (bsc#1254297). - CVE-2025-7039: integer overflow when creating temporary files may lead to an out-of-bounds memory access that can be used for path traversal or exposure of sensitive content in a temporary file (bsc#1249055).
Other issues fixed and changes:
- Fix GFile leak in
g_local_file_set_display_nameduring error handling. - Fix incorrect output parameter handling in closure helper of
g_settings_bind_with_mapping_closures. gfileutils: fix computation of temporary file name.- Fix GFile leak in
g_local_file_set_display_name(). gthreadpool: catchpool_spawnercreation failure.gio/filenamecompleter: fix leaks.gfilenamecompleter: fixg_object_unref()of undefined value.
Список пакетов
openSUSE Leap 16.0
Ссылки
- SUSE Security Ratings
- SUSE Bug 1249055
- SUSE Bug 1254297
- SUSE Bug 1254662
- SUSE Bug 1254878
- SUSE CVE CVE-2025-13601 page
- SUSE CVE CVE-2025-14087 page
- SUSE CVE CVE-2025-14512 page
- SUSE CVE CVE-2025-7039 page
Описание
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
Затронутые продукты
Ссылки
- CVE-2025-13601
- SUSE Bug 1254297
Описание
A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.
Затронутые продукты
Ссылки
- CVE-2025-14087
- SUSE Bug 1254662
Описание
A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
Затронутые продукты
Ссылки
- CVE-2025-14512
- SUSE Bug 1254878
Описание
A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
Затронутые продукты
Ссылки
- CVE-2025-7039
- SUSE Bug 1249055