PatchSiren cyber security CVE debrief
CVE-2025-14087 Redhat CVE debrief
CVE-2025-14087 describes a flaw in GLib’s GVariant parser that can be triggered by maliciously crafted input strings. The result can be heap corruption, which may lead to denial of service and, in some cases, potential code execution. NVD records this as a medium-severity issue, and Red Hat-linked references show affected GLib versions before 2.86.3 as well as multiple Red Hat Enterprise Linux streams.
- Vendor
- Redhat
- Product
- CVE-2025-14087
- CVSS
- MEDIUM 5.6
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-12-10
- Original CVE updated
- 2026-05-11
- Advisory published
- 2025-12-10
- Advisory updated
- 2026-05-11
Who should care
Administrators and developers who ship or depend on GLib, especially software that parses untrusted GVariant input. Red Hat Enterprise Linux customers on affected releases (7, 8, 9, and 10) should pay particular attention to the linked errata and package updates.
Technical summary
The supplied record describes a buffer-underflow condition in the GVariant parser that can corrupt heap memory when processing attacker-controlled strings. NVD lists the weakness classification as CWE-190 via Red Hat’s security metadata, and the affected GLib range is shown as versions earlier than 2.86.3. The published CVSS vector is AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L, indicating remote reachability without privileges or user interaction, but with higher attack complexity.
Defensive priority
Medium priority. The severity score is 5.6 and there is no KEV listing in the supplied data, but the issue affects a widely used library and can impact systems that accept untrusted input.
Recommended defensive actions
- Upgrade GLib to 2.86.3 or later, or install the vendor errata that include the fix for your platform.
- Apply the referenced Red Hat advisories for affected RHEL releases: RHSA-2026:15953, RHSA-2026:15969, RHSA-2026:15971, and RHSA-2026:7461.
- Review applications and services that parse external or attacker-controlled GVariant strings, since those are the most relevant exposure points.
- If patching is delayed, reduce exposure by limiting untrusted input paths and monitoring for abnormal crashes in GLib-using services.
Evidence notes
This brief is based only on the supplied NVD record and its official references. The record states a GLib GVariant parser buffer-underflow with heap corruption, lists vulnerable GLib versions before 2.86.3, and includes Red Hat security references and a GNOME issue tracker link. Timing context uses the provided CVE published and modified timestamps from 2025-12-10 and 2026-05-11.
Official resources
-
CVE-2025-14087 CVE record
CVE.org
-
CVE-2025-14087 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Mitigation, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Third Party Advisory
- Source reference
Publicly disclosed in the CVE/NVD record on 2025-12-10, with later record modification on 2026-05-11.