[CLSA-2026:1771857466] Fix CVE(s): CVE-2025-14087
Type:
security
Severity:
Critical
Release date:
2026-02-23 14:37:50 UTC
Description:
* SECURITY UPDATE: Buffer underflow / integer overflow in GVariant text format parser - debian/patches/CVE-2025-14087.patch: fix potential integer overflow parsing strings, bytestrings, and child element counts in gvariant-parser.c - CVE-2025-14087
Updated packages:
  • libglib2.0-0_2.58.3-2+deb10u6+tuxcare.els2_amd64.deb
    sha:55f900b3d956134ec6f0234fb76e4b8fdc89adb3
  • libglib2.0-bin_2.58.3-2+deb10u6+tuxcare.els2_amd64.deb
    sha:517c3cd3499d5472d733828c68668be257467f92
  • libglib2.0-data_2.58.3-2+deb10u6+tuxcare.els2_all.deb
    sha:70ff4fa0b8129bf87739e4865cf018d7227f8018
  • libglib2.0-dev_2.58.3-2+deb10u6+tuxcare.els2_amd64.deb
    sha:ec528152e575b0345314e3b50d3fcdd6a146a4fb
  • libglib2.0-dev-bin_2.58.3-2+deb10u6+tuxcare.els2_amd64.deb
    sha:d9d993f9fade496168daa27d3d34d51e9afb23e2
  • libglib2.0-doc_2.58.3-2+deb10u6+tuxcare.els2_all.deb
    sha:bb84cb5d5ca1a72ebea91cad80ee6700aee2c617
  • libglib2.0-tests_2.58.3-2+deb10u6+tuxcare.els2_amd64.deb
    sha:4e00a53f5b2a01064240abfa8a6d637c79958669
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.