Your message dated Sun, 21 Dec 2025 16:02:46 +0000
with message-id <[email protected]>
and subject line Bug#1121488: fixed in glib2.0 2.84.4-3~deb13u2
has caused the Debian Bug report #1121488,
regarding glib#3827, CVE-2025-13601: integer overflow escaping large strings 
for inclusion in URIs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1121488: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121488
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: glib2.0
Version: 2.86.2-1
Severity: important
Tags: security upstream
Forwarded: https://gitlab.gnome.org/GNOME/glib/-/issues/3827
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for glib2.0.

CVE-2025-13601[0]:
| A heap-based buffer overflow problem was found in glib through an
| incorrect calculation of buffer size in the g_escape_uri_string()
| function. If the string to escape contains a very large number of
| unacceptable characters (which would need escaping), the calculation
| of the length of the escaped string could overflow, leading to a
| potential write off the end of the newly allocated string.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-13601
    https://www.cve.org/CVERecord?id=CVE-2025-13601
[1] https://gitlab.gnome.org/GNOME/glib/-/issues/3827

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: glib2.0
Source-Version: 2.84.4-3~deb13u2
Done: Simon McVittie <[email protected]>

We believe that the bug you reported is fixed in the latest version of
glib2.0, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Simon McVittie <[email protected]> (supplier of updated glib2.0 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 12 Dec 2025 18:43:13 +0000
Source: glib2.0
Architecture: source
Version: 2.84.4-3~deb13u2
Distribution: trixie
Urgency: medium
Maintainer: Debian GNOME Maintainers 
<[email protected]>
Changed-By: Simon McVittie <[email protected]>
Closes: 1121488 1122346 1122347
Changes:
 glib2.0 (2.84.4-3~deb13u2) trixie; urgency=medium
 .
   * d/patches: Add patches from 2.86.3 upstream to avoid integer overflows
     - d/p/gconvert-Error-out-if-g_escape_uri_string-would-overflow.patch,
       d/p/fuzzing-Add-fuzz-tests-for-g_filename_-to-from-_uri.patch:
       Fix an integer overflow when interpolating hundreds of megabytes of
       unescaped text into a URI, and add test coverage
       (CVE-2025-13601, glib#3827 upstream, Closes: #1121488)
     - d/p/gvariant-parser-Fix-potential-integer-overflow-parsing-by.patch:
       Fix an integer overflow when parsing very large strings in GVariant
       text format (CVE-2025-14087, glib#3834 upstream, Closes: #1122347)
     - d/p/gvariant-parser-Use-size_t-to-count-numbers-of-child-elem.patch,
       d/p/gvariant-parser-Convert-error-handling-code-to-use-size_t.patch:
       Fix other potential integer overflows parsing very large container
       types in GVariant text format, related to CVE-2025-14087
     - d/p/gfileattribute-Fix-integer-overflow-calculating-escaping-.patch:
       Fix an integer overflow when escaping invalid characters in very
       large file attributes
       (CVE-2025-14512, glib#3845 upstream, Closes: #1122346)
Checksums-Sha1:
 352632dbd57965138cc612e4a5369997410d7b6c 5004 glib2.0_2.84.4-3~deb13u2.dsc
 80a867d4c954c5b1fb074673926e89950d22e04d 147008 
glib2.0_2.84.4-3~deb13u2.debian.tar.xz
 59a4c0d8d9259083e5b7306bd920c2b3a289629d 7656 
glib2.0_2.84.4-3~deb13u2_source.buildinfo
Checksums-Sha256:
 11f6bc2e601e6f682cda7b9e9473573625de6d5bca840fd9167c8753b95deade 5004 
glib2.0_2.84.4-3~deb13u2.dsc
 61a886d74a2a77179bea9b89bad4e7eec421c3a553add55ec7ddd0bb1e1eefec 147008 
glib2.0_2.84.4-3~deb13u2.debian.tar.xz
 6f7fc6e83801a4bddb79fcef6165ad833b98eee9de8c3a4919e39934573e4acc 7656 
glib2.0_2.84.4-3~deb13u2_source.buildinfo
Files:
 1440ec360a9fa85c47d28a4bc9b4e8f0 5004 libs optional 
glib2.0_2.84.4-3~deb13u2.dsc
 6548f0874c6c78def9772ce5ed561168 147008 libs optional 
glib2.0_2.84.4-3~deb13u2.debian.tar.xz
 0dcc3f50320457328878628f543ee4d2 7656 libs optional 
glib2.0_2.84.4-3~deb13u2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=YrG1
-----END PGP SIGNATURE-----

Attachment: pgp_N8WC6uVPd.pgp
Description: PGP signature


--- End Message ---

Reply via email to