CVE-2025-14087
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-10

Last updated on: 2026-04-19

Assigner: Red Hat, Inc.

Description
A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-10
Last Modified
2026-04-19
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
gnome glib to 2.86.3 (inc)
redhat enterprise_linux 7.0
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0
redhat enterprise_linux 10.0
gnome glib 3.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-190 The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a flaw in GLib (Gnome Lib) where a remote attacker can cause heap corruption through a buffer-underflow in the GVariant parser by sending maliciously crafted input strings. This can lead to denial of service or potentially allow code execution.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing a remote attacker to cause a denial of service, making the affected system or application unavailable. In some cases, it could also allow the attacker to execute arbitrary code, potentially compromising the system.


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to apply the patch provided by the maintainers upstream for GLib. Since the vulnerability affects all Linux systems using GLib, updating GLib to the fixed version will prevent exploitation of the buffer underflow in the GVariant parser. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart