File _patchinfo of Package patchinfo.41972
<patchinfo incident="41972"> <issue tracker="cve" id="2025-14512"/> <issue tracker="cve" id="2025-14087"/> <issue tracker="cve" id="2025-13601"/> <issue tracker="bnc" id="1254878">VUL-0: CVE-2025-14512: glib2: Integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow</issue> <issue tracker="bnc" id="1254662">VUL-0: CVE-2025-14087: glib2: buffer underflow in GVariant parser leads to heap corruption</issue> <issue tracker="bnc" id="1254297">VUL-0: CVE-2025-13601: glib2: Integer overflow in in g_escape_uri_string()</issue> <category>security</category> <rating>important</rating> <packager>mgorse</packager> <summary>Security update for glib2</summary> <description>This update for glib2 fixes the following issues: - CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote filesystem attribute values can lead to denial-of-service (bsc#1254878). - CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when processing attacker-influenced data may lead to crash or code execution (bsc#1254662). - CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a large number of unacceptable characters may lead to crash or code execution (bsc#1254297). </description> </patchinfo>