CVE-2025-13601 – Glib: integer overflow in in g_escape_uri_string()

The following table lists the changes that have been made to the
CVE-2025-13601 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Nov. 26, 2025

    Action Type Old Value New Value
    Added Description A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
    Added CVSS V3.1 AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
    Added CWE CWE-190
    Added Reference https://access.redhat.com/security/cve/CVE-2025-13601
    Added Reference https://bugzilla.redhat.com/show_bug.cgi?id=2416741
    Added Reference https://gitlab.gnome.org/GNOME/glib/-/issues/3827
    Added Reference https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914
Share the Post:

Related Posts