Bug#1122373: trixie-pu: package glib2.0/2.84.4-3~deb13u2
Simon McVittie
smcv at debian.org
Wed Dec 10 14:13:34 GMT 2025
Package: release.debian.org
Severity: normal
Tags: trixie
X-Debbugs-Cc: glib2.0 at packages.debian.org
Control: affects -1 + src:glib2.0
User: release.debian.org at packages.debian.org
Usertags: pu
[ Reason ]
Fix low-severity CVEs
[ Impact ]
If software parses inadvisably large amounts of attacker-controlled
GVariant text format (≥ 1 GiB), or escapes inadvisably large
attacker-controlled strings for inclusion in URIs (≥ 0.5 GiB), or loads
inadvisably large attacker-controlled GIO file attributes (≥ 1 GiB),
then an attacker could cause denial of service or possibly arbitrary
code execution.
The security team agrees that these are "no-DSA" issues.
[ Tests ]
The test suite still passes. The fixes are not really feasible to
unit-test since they require allocating (at least) hundreds of MiB of
junk.
A GNOME desktop boots successfully in a virtual machine with the
proposed GLib. I'll test on real hardware before uploading.
[ Risks ]
The patches were reviewed by upstream and are narrowly targeted, so I
think this is fine.
[ Checklist ]
[x] *all* changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in (old)stable
[x] the issue is verified as fixed in unstable
[ Changes ]
All changes fix potential integer overflows by making sure to do
address calculations in unsigned size_t space, except for one patch that
adds a fuzzing driver for one of the affected areas.
The attached diff is not finalized and will need a `dch -r`.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: glib.diff
Type: text/x-diff
Size: 31154 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-gnome-maintainers/attachments/20251210/29561def/attachment-0001.diff>
More information about the pkg-gnome-maintainers
mailing list