Bug 2419093 (CVE-2025-14087) - CVE-2025-14087 glib: GLib: Buffer underflow in GVariant parser leads to heap corruption
Summary: CVE-2025-14087 glib: GLib: Buffer underflow in GVariant parser leads to heap ...
Keywords:
Status: NEW
Alias: CVE-2025-14087
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2419105 2419106 2419111 2419124 2419125 2419130 2419097 2419098 2419099 2419100 2419101 2419102 2419103 2419104 2419107 2419108 2419109 2419112 2419113 2419114 2419115 2419116 2419117 2419118 2419119 2419120 2419121 2419122 2419123 2419126 2419127 2419128 2419129 2419131 2419132 2419133 2419134
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-12-05 08:44 UTC by OSIDB Bzimport
Modified: 2025-12-10 08:36 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-12-05 08:44:36 UTC
A buffer-underflow vulnerability exists in GLib’s GVariant parser, specifically within bytestring_parse() and string_parse(). The parser uses signed 32-bit integers (gint) as loop indices (i and j). When extremely large strings are parsed, these counters overflow into negative values, causing the parser to write to memory before the start of the allocated buffer (str[j++]). This results in a classic out-of-bounds write condition. Because GVariant parsing is often performed on attacker-influenced data, a remote attacker can trigger heap corruption, causing a crash or potentially achieving code execution. This flaw has been confirmed by maintainers and patched upstream.


Note You need to log in before you can comment on or make changes to this bug.