CVE-2025-13601
📋 TL;DR
A heap-based buffer overflow vulnerability in glib's g_escape_uri_string() function allows attackers to write beyond allocated memory boundaries when processing strings with many characters requiring escaping. This could lead to arbitrary code execution or application crashes. Systems using glib for URI escaping are affected.
💻 Affected Systems
- glib
- Applications/libraries using glib for URI escaping
📦 What is this software?
Codeready Linux Builder For Arm64 by Redhat
Codeready Linux Builder For Arm64 by Redhat
Codeready Linux Builder For Arm64 by Redhat
Codeready Linux Builder For Arm64 Eus by Redhat
View all CVEs affecting Codeready Linux Builder For Arm64 Eus →
Codeready Linux Builder For Arm64 Eus by Redhat
View all CVEs affecting Codeready Linux Builder For Arm64 Eus →
Codeready Linux Builder For Ibm Z Systems by Redhat
View all CVEs affecting Codeready Linux Builder For Ibm Z Systems →
Codeready Linux Builder For Ibm Z Systems by Redhat
View all CVEs affecting Codeready Linux Builder For Ibm Z Systems →
Codeready Linux Builder For Ibm Z Systems by Redhat
View all CVEs affecting Codeready Linux Builder For Ibm Z Systems →
Codeready Linux Builder For Ibm Z Systems by Redhat
View all CVEs affecting Codeready Linux Builder For Ibm Z Systems →
Codeready Linux Builder For Ibm Z Systems by Redhat
View all CVEs affecting Codeready Linux Builder For Ibm Z Systems →
Codeready Linux Builder For Ibm Z Systems Eus by Redhat
View all CVEs affecting Codeready Linux Builder For Ibm Z Systems Eus →
Codeready Linux Builder For Power Little Endian by Redhat
View all CVEs affecting Codeready Linux Builder For Power Little Endian →
Codeready Linux Builder For Power Little Endian by Redhat
View all CVEs affecting Codeready Linux Builder For Power Little Endian →
Codeready Linux Builder For Power Little Endian by Redhat
View all CVEs affecting Codeready Linux Builder For Power Little Endian →
Codeready Linux Builder For Power Little Endian by Redhat
View all CVEs affecting Codeready Linux Builder For Power Little Endian →
Codeready Linux Builder For Power Little Endian by Redhat
View all CVEs affecting Codeready Linux Builder For Power Little Endian →
Codeready Linux Builder For Power Little Endian Eus by Redhat
View all CVEs affecting Codeready Linux Builder For Power Little Endian Eus →
Codeready Linux Builder For X86 64 by Redhat
View all CVEs affecting Codeready Linux Builder For X86 64 →
Codeready Linux Builder For X86 64 by Redhat
View all CVEs affecting Codeready Linux Builder For X86 64 →
Codeready Linux Builder For X86 64 by Redhat
View all CVEs affecting Codeready Linux Builder For X86 64 →
Codeready Linux Builder For X86 64 by Redhat
View all CVEs affecting Codeready Linux Builder For X86 64 →
Codeready Linux Builder For X86 64 by Redhat
View all CVEs affecting Codeready Linux Builder For X86 64 →
Codeready Linux Builder For X86 64 Eus by Redhat
View all CVEs affecting Codeready Linux Builder For X86 64 Eus →
Discovery by Redhat
Enterprise Linux For Ibm Z Systems by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems →
Enterprise Linux For Ibm Z Systems by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems →
Enterprise Linux For Ibm Z Systems by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems →
Enterprise Linux For Ibm Z Systems by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems →
Enterprise Linux For Ibm Z Systems by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems →
Enterprise Linux For Ibm Z Systems by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems →
Enterprise Linux For Ibm Z Systems Eus by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems Eus →
Enterprise Linux For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian →
Enterprise Linux For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian →
Enterprise Linux For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian →
Enterprise Linux For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian →
Enterprise Linux For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian →
Enterprise Linux For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian →
Enterprise Linux For Power Little Endian Eus by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian Eus →
Enterprise Linux For Power Little Endian Eus by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian Eus →
Enterprise Linux Server For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux Server For Power Little Endian →
Enterprise Linux Server For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux Server For Power Little Endian →
Enterprise Linux Server For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux Server For Power Little Endian →
Enterprise Linux Server For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux Server For Power Little Endian →
Enterprise Linux Server For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux Server For Power Little Endian →
Enterprise Linux Server For Power Little Endian Eus by Redhat
View all CVEs affecting Enterprise Linux Server For Power Little Endian Eus →
Glib by Gnome
Openshift Container Platform For Arm64 by Redhat
View all CVEs affecting Openshift Container Platform For Arm64 →
Openshift Container Platform For Arm64 by Redhat
View all CVEs affecting Openshift Container Platform For Arm64 →
Openshift Container Platform For Arm64 by Redhat
View all CVEs affecting Openshift Container Platform For Arm64 →
Openshift Container Platform For Arm64 by Redhat
View all CVEs affecting Openshift Container Platform For Arm64 →
Openshift Container Platform For Arm64 by Redhat
View all CVEs affecting Openshift Container Platform For Arm64 →
Openshift Container Platform For Ibm Z by Redhat
View all CVEs affecting Openshift Container Platform For Ibm Z →
Openshift Container Platform For Ibm Z by Redhat
View all CVEs affecting Openshift Container Platform For Ibm Z →
Openshift Container Platform For Ibm Z by Redhat
View all CVEs affecting Openshift Container Platform For Ibm Z →
Openshift Container Platform For Ibm Z by Redhat
View all CVEs affecting Openshift Container Platform For Ibm Z →
Openshift Container Platform For Ibm Z by Redhat
View all CVEs affecting Openshift Container Platform For Ibm Z →
Openshift Container Platform For Linuxone by Redhat
View all CVEs affecting Openshift Container Platform For Linuxone →
Openshift Container Platform For Linuxone by Redhat
View all CVEs affecting Openshift Container Platform For Linuxone →
Openshift Container Platform For Linuxone by Redhat
View all CVEs affecting Openshift Container Platform For Linuxone →
Openshift Container Platform For Linuxone by Redhat
View all CVEs affecting Openshift Container Platform For Linuxone →
Openshift Container Platform For Linuxone by Redhat
View all CVEs affecting Openshift Container Platform For Linuxone →
Openshift Container Platform For Power by Redhat
View all CVEs affecting Openshift Container Platform For Power →
Openshift Container Platform For Power by Redhat
View all CVEs affecting Openshift Container Platform For Power →
Openshift Container Platform For Power by Redhat
View all CVEs affecting Openshift Container Platform For Power →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment.
Likely Case
Application crashes causing denial of service, potentially leading to data corruption or service disruption.
If Mitigated
Limited impact with proper memory protections (ASLR, DEP) and application sandboxing, possibly just crashes.
🎯 Exploit Status
Exploitation requires crafting specific input strings with many escapable characters. No public exploit code known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Red Hat advisories for specific patched versions
Vendor Advisory: https://access.redhat.com/errata/RHSA-2026:0936
Restart Required: Yes
Instructions:
1. Check your glib version. 2. Apply vendor patches via package manager (yum update glib, apt-get upgrade libglib2.0). 3. Restart affected services or reboot system.
🔧 Temporary Workarounds
Input Validation
allValidate and sanitize input before passing to g_escape_uri_string()
Implement input validation in application code
Memory Protection
linuxEnable ASLR and DEP to reduce exploit success
sysctl -w kernel.randomize_va_space=2
Check /proc/sys/kernel/exec-shield
🧯 If You Can't Patch
- Isolate vulnerable systems in network segments with strict access controls
- Implement web application firewall (WAF) rules to block malicious URI patterns
🔍 How to Verify
Check if Vulnerable:
Check glib version: rpm -q glib2 or dpkg -l libglib2.0-0
Check Version:
rpm -q glib2 --queryformat '%{VERSION}-%{RELEASE}\n' or dpkg -s libglib2.0-0 | grep Version
Verify Fix Applied:
Verify updated version matches patched version from Red Hat advisories
📡 Detection & Monitoring
Log Indicators:
- Application crashes with segmentation faults
- Unusual memory allocation patterns in system logs
Network Indicators:
- Unusually long URI requests with many special characters
- Repeated crash/restart patterns in services
SIEM Query:
source="application.logs" AND ("segmentation fault" OR "buffer overflow") AND process="*glib*"
🔗 References
- https://access.redhat.com/errata/RHSA-2026:0936
- https://access.redhat.com/errata/RHSA-2026:0975
- https://access.redhat.com/errata/RHSA-2026:0991
- https://access.redhat.com/errata/RHSA-2026:1323
- https://access.redhat.com/errata/RHSA-2026:1324
- https://access.redhat.com/errata/RHSA-2026:1326
- https://access.redhat.com/errata/RHSA-2026:1327
- https://access.redhat.com/errata/RHSA-2026:1465
- https://access.redhat.com/errata/RHSA-2026:1608
- https://access.redhat.com/errata/RHSA-2026:1624
- https://access.redhat.com/errata/RHSA-2026:1625
- https://access.redhat.com/errata/RHSA-2026:1626
- https://access.redhat.com/errata/RHSA-2026:1627
- https://access.redhat.com/errata/RHSA-2026:1652
- https://access.redhat.com/errata/RHSA-2026:1736
- https://access.redhat.com/errata/RHSA-2026:2064
- https://access.redhat.com/errata/RHSA-2026:2072
- https://access.redhat.com/errata/RHSA-2026:2485
- https://access.redhat.com/errata/RHSA-2026:2563
- https://access.redhat.com/errata/RHSA-2026:2633
- https://access.redhat.com/errata/RHSA-2026:2659
- https://access.redhat.com/errata/RHSA-2026:2671
- https://access.redhat.com/errata/RHSA-2026:2974
- https://access.redhat.com/errata/RHSA-2026:3415
- https://access.redhat.com/security/cve/CVE-2025-13601
- https://bugzilla.redhat.com/show_bug.cgi?id=2416741
- https://gitlab.gnome.org/GNOME/glib/-/issues/3827
- https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914