FKIE_CVE-2025-13601

Vulnerability from fkie_nvd - Published: 2025-11-26 15:15 - Updated: 2026-02-19 07:17
Summary
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
References
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:0936Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:0975Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:0991Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1323Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1324Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1326Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1327Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1465Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1608Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1624Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1625Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1626Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1627Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1652Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:1736Vendor Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:2064
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:2072
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:2485
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:2563
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:2633
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:2659
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2026:2671
secalert@redhat.comhttps://access.redhat.com/security/cve/CVE-2025-13601Vendor Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=2416741Issue Tracking, Vendor Advisory
secalert@redhat.comhttps://gitlab.gnome.org/GNOME/glib/-/issues/3827Exploit, Issue Tracking
secalert@redhat.comhttps://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914Third Party Advisory
Impacted products
Vendor Product Version
redhat codeready_linux_builder 9.0
redhat codeready_linux_builder_for_ibm_z_systems 9.0_s390x
redhat codeready_linux_builder_for_power_little_endian 9.0_ppc64le
redhat codeready_linux_builder_for_x86_64 9.0
redhat enterprise_linux_for_arm_64 9.0
redhat enterprise_linux_for_ibm_z_systems 9.0_s390x
redhat enterprise_linux_for_power_little_endian 9.0_ppc64le
redhat enterprise_linux_for_x86_64 9.0
redhat codeready_linux_builder_for_arm64 10.0
redhat codeready_linux_builder_for_ibm_z_systems 10.0_s390x
redhat codeready_linux_builder_for_power_little_endian 10.0_ppc64le
redhat codeready_linux_builder_for_x86_64 10.0
redhat enterprise_linux_for_arm_64 10.0
redhat enterprise_linux_for_ibm_z_systems 10.0_s390x
redhat enterprise_linux_for_power_little_endian 10.0_ppc64le
redhat enterprise_linux_for_x86_64 10.0
redhat codeready_linux_builder_for_arm64 8.0
redhat codeready_linux_builder_for_ibm_z_systems 8.0_s390x
redhat codeready_linux_builder_for_power_little_endian 8.0_ppc64le
redhat codeready_linux_builder_for_x86_64 8.0
redhat enterprise_linux_for_arm_64 8.0
redhat enterprise_linux_for_ibm_z_systems 8.0_s390x
redhat enterprise_linux_for_power_little_endian 8.0_ppc64le
redhat enterprise_linux_for_x86_64 8.0
redhat enterprise_linux_for_arm_64 9.2
redhat enterprise_linux_for_ibm_z_systems 9.2_s390x
redhat enterprise_linux_for_power_little_endian 9.2_ppc64le
redhat enterprise_linux_for_x86_64 9.2
redhat enterprise_linux_server_aus 9.2
redhat codeready_linux_builder_for_arm64_eus 9.4
redhat codeready_linux_builder_for_ibm_z_systems 9.4_s390x
redhat codeready_linux_builder_for_power_little_endian 9.4_ppc64le
redhat codeready_linux_builder_for_x86_64 9.4
redhat enterprise_linux_for_arm_64 9.4
redhat enterprise_linux_for_ibm_z_systems 9.4_s390x
redhat enterprise_linux_for_power_little_endian 9.4_ppc64le
redhat enterprise_linux_for_x86_64 9.4
redhat enterprise_linux_for_x86_64_eus 9.4
redhat enterprise_linux_server_aus 9.4
redhat enterprise_linux_server_for_power_little_endian 9.4_ppc64le
redhat enterprise_linux_server_for_power_little_endian_eus 9.4_ppc64le
redhat codeready_linux_builder_for_arm64_eus 10.0
redhat codeready_linux_builder_for_ibm_z_systems_eus 10.0_s390x
redhat codeready_linux_builder_for_power_little_endian_eus 10.0_ppc64le
redhat codeready_linux_builder_for_x86_64_eus 10.0
redhat enterprise_linux_for_arm_64_eus 10.0
redhat enterprise_linux_for_ibm_z_systems_eus 10.0_s390x
redhat enterprise_linux_for_power_little_endian_eus 10.0_ppc64le
redhat enterprise_linux_for_x86_64_eus 10.0
redhat enterprise_linux_server_for_power_little_endian 10.0_ppc64le
redhat codeready_linux_builder_for_arm64 9.6
redhat codeready_linux_builder_for_ibm_z_systems 9.6_s390x
redhat codeready_linux_builder_for_power_little_endian 9.6_ppc64le
redhat codeready_linux_builder_for_x86_64 9.6
redhat enterprise_linux_for_arm_64 9.6
redhat enterprise_linux_for_ibm_z_systems 9.6_s390x
redhat enterprise_linux_for_power_little_endian 9.6_ppc64le
redhat enterprise_linux_for_power_little_endian_eus 9.6_ppc64le
redhat enterprise_linux_for_x86_64 9.6
redhat enterprise_linux_for_x86_64_eus 9.6
redhat enterprise_linux_server_aus 9.6
redhat enterprise_linux_server_for_power_little_endian 9.6_ppc64le
redhat enterprise_linux_for_x86_64 8.6
redhat enterprise_linux_for_x86_64_eus 8.6
redhat enterprise_linux_server_aus 8.6
redhat enterprise_linux_server_for_power_little_endian 8.6_ppc64le
redhat enterprise_linux_server_tus 8.6
redhat enterprise_linux_for_x86_64 8.8
redhat enterprise_linux_for_x86_64_eus 8.8
redhat enterprise_linux_server_for_power_little_endian 8.8_ppc64le
redhat enterprise_linux_server_tus 8.8
redhat enterprise_linux_for_x86_64_eus 8.4
redhat enterprise_linux_server_aus 8.4
redhat enterprise_linux_server_aus 8.2
redhat ceph_storage 8.0
redhat discovery 2.0
gnome glib *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder:9.0:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "7905C85D-4663-4485-99C1-202F4A7D6EBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA3C5EAE-267F-410F-8AFA-8F5B68A9E617",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B3D7389-35C1-48C4-A9EC-2564842723C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D70C7263-C24B-4090-9E44-0E0CFD2294A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "1810D5FB-1AB2-4861-A671-CA548C2FFDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB056B47-1F45-4CE4-81F6-872F66C24C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "E07C1C58-0E5F-4B56-9B8D-5DE67DB00F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE296A4-202C-41AF-92AB-AC0672EAFA90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:10.0:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "EF8B4882-78F7-4DC5-BF80-983143DA0155",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:10.0_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA2DB6C0-E18E-492A-B517-4020A7FB049A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:10.0_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FAC9D08-6D5C-443D-99C7-6FD20AF83523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D791EEA5-68D1-41E0-A53D-8EBB9C6CF873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:10.0:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "18873769-C951-42F2-A98B-761652148F59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:10.0_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "8492E227-C09E-4F51-8EAF-0F7BCCD41A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:10.0_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FABD546-0E45-4A65-A2E5-50EC62B852E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C4D6060-0C13-4976-A366-C4655367AA78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:8.0:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "C70933CB-B915-4792-902B-CC858829D208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "55CF7208-4D36-4C35-92BC-F6EA2C8DEDE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "F791F846-7762-40E0-9056-032FD10F2046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F967F2F2-9B99-46D3-A092-F7AE41F5D5B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "73F3D9DA-CEFB-471B-85A2-8652D37D7F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AF225E-94C0-4D07-900C-DD868C05F554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D471AC-7DCA-4425-AD91-E5D928753A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "97104CED-E93B-49CE-81F8-810AF2A8A392",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "4ACBFE13-EF28-48EC-ACDC-AC3159C2AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E068ABB-31C2-416E-974A-95E07A2BAB0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.2_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED521457-498F-4E43-B714-9A3F2C3CD09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DA6342-8316-4961-9C2A-01D6DC51446A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "80A262F1-B05B-43BA-ABB2-0FDE68C16A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E1C5656-6A78-4DCD-A369-76DFD61618E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.4_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0002CB3-8004-4927-A92C-E7C1F83322E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4B9984-698D-4A60-AB6C-3B4CCDD9697F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "8B79BA89-CB0F-4153-9692-AA9BEA765076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "069180B4-BA50-4AD0-8BA9-83F8005E58BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.4_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "53EBD3B7-D31D-46A5-BDFA-178FDF79C776",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A75E10C3-AA3F-43CD-AB14-16754619B48D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5EF3CEF-62CF-4860-8301-4154D2407236",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "39D345D3-108A-4551-A112-5EE51991411A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:9.4_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "212A3822-46F7-4144-B875-349452A93F73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "24105826-EBD2-4029-978B-B7176343C09C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:10.0:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "C1FC4688-EE61-40B0-B36C-5B40A54FEB0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:10.0_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E6DF379-2929-4F2B-A3F7-D32EF0A634B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:10.0_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B04B55-C375-4A04-88B6-307B5121538D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64_eus:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEA15D8-8BE8-4D4A-97C3-5F237CAB18DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:10.0:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "FC6F6213-7AE9-4454-B3CB-8AD6999C733E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:10.0_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D8456B7-F13F-4E74-B610-F1301B738A6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:10.0_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "189D490B-E674-4957-BD84-B0615A06FBF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ECE154D-05A8-43F6-AAEB-9EF460B3A721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:10.0_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "50CBF587-5E49-41B8-803E-3020142FF1A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.6:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "9B58B337-8F7B-4812-91BF-F26044EDF603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.6_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A892AD-1CB2-42AC-B163-DB34613D8AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.6_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC8564CF-FCAC-48AE-AE11-4AB7068197BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "241FE2FA-8B22-4878-B30A-81ABEFD29C2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.6:*:*:*:*:*:aarch64:*",
              "matchCriteriaId": "8E3BC071-331C-40FF-911C-699B83C9E874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.6_s390x:*:*:*:*:*:*:*",
              "matchCriteriaId": "D284FF58-5ED8-4F0F-80BA-4E677256994A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.6_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F38D24-E400-42E8-BBD3-CA44CE414D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.6_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "0516993E-CBD5-44F1-8684-7172C9ABFD0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAF644CC-8CDF-4C0C-B40C-80106A479B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7254B894-CFCB-4599-8228-A3DD7C996489",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FDD919E-B7FE-4EC5-8D6B-EC9A4723D6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:9.6_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA517DC-CC2E-4F71-A753-3611747C2B03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04BCAC6-85B4-45C3-9591-B8A3B95E0682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4865A7-DD37-45C0-839E-AA07F47DD44F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C24D94-834A-4E9D-8F73-624AFA99AAA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:8.6_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5ACFD7D-558D-4E72-824B-3C890BE76086",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1272DF03-7674-4BD4-8E64-94004B195448",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7692F48F-F14D-452A-B145-761A28A65063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "439D3548-E194-4A99-8E39-EC1A7B1C0BAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:8.8_ppc64le:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F10F1F-5DA7-49FF-A8A7-524251699323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1CA946D-1665-4874-9D41-C7D963DD1F56",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A50F79DB-13DE-4725-962D-9487256F03EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28F226A-CBC7-4A32-BE58-398FA5B42481",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6897676D-53F9-45B3-B27F-7FF9A4C58D33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:ceph_storage:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "52AE9D9D-5D74-4AB8-8FF9-5CEA2A1A97B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:discovery:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C0E53D-07D5-48BF-8749-637DACF255A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "890566A0-619C-42E2-BD1D-9EFAC63E68F4",
              "versionEndExcluding": "2.86.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string."
    }
  ],
  "id": "CVE-2025-13601",
  "lastModified": "2026-02-19T07:17:31.273",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 5.2,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-11-26T15:15:51.723",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:0936"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:0975"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:0991"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1323"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1324"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1326"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1327"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1465"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1608"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1624"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1625"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1626"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1627"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1652"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2026:1736"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2026:2064"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2026:2072"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2026:2485"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2026:2563"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2026:2633"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2026:2659"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2026:2671"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2025-13601"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…