You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to
https://nvd.nist.gov
An official website of the United States government
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.
Description
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
Metrics
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected].
OR
*cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
Added
CPE Configuration
OR
*cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.4:*:*:*:*:*:*:*
Added
CPE Configuration
OR
*cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_for_x86_64:8.6:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.6:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:8.6_ppc64le:*:*:*:*:*:*:*
Added
CPE Configuration
OR
*cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.2_ppc64le:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2:*:*:*:*:*:aarch64:*
Added
CPE Configuration
OR
*cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_for_x86_64:8.8:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.8:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:8.8_ppc64le:*:*:*:*:*:*:*
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:0936 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:0975 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:0991 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1323 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1324 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1326 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1327 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1465 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1608 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1624 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1625 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1626 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1627 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1652 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/errata/RHSA-2026:1736 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://access.redhat.com/security/cve/CVE-2025-13601 Types: Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://bugzilla.redhat.com/show_bug.cgi?id=2416741 Types: Issue Tracking, Vendor Advisory
Added
Reference Type
Red Hat, Inc.: https://gitlab.gnome.org/GNOME/glib/-/issues/3827 Types: Exploit, Issue Tracking
Added
Reference Type
Red Hat, Inc.: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 Types: Third Party Advisory
CVE Modified by Red Hat, Inc.2/02/2026 6:15:58 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1736
CVE Modified by Red Hat, Inc.2/02/2026 5:16:05 AM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1652
CVE Modified by Red Hat, Inc.2/01/2026 11:15:54 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1624
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1626
CVE Modified by Red Hat, Inc.2/01/2026 9:16:10 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1608
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1625
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1627
CVE Modified by Red Hat, Inc.1/28/2026 2:15:57 AM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1465
CVE Modified by Red Hat, Inc.1/27/2026 5:15:48 AM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1324
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1326
CVE Modified by Red Hat, Inc.1/27/2026 3:16:01 AM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1323
Added
Reference
https://access.redhat.com/errata/RHSA-2026:1327
CVE Modified by Red Hat, Inc.1/22/2026 12:15:53 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2026:0991
CVE Modified by Red Hat, Inc.1/22/2026 5:16:07 AM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2026:0975
CVE Modified by Red Hat, Inc.1/21/2026 6:15:51 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2026:0936
New CVE Received from Red Hat, Inc.11/26/2025 10:15:51 AM
Action
Type
Old Value
New Value
Added
Description
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.