A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.
Metrics
Affected Vendors & Products
References
History
Sat, 14 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 13 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 13 Jun 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption. | |
Title | Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring | |
First Time appeared |
Redhat
Redhat enterprise Linux |
|
Weaknesses | CWE-190 | |
CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-06-13T15:40:38.541Z
Updated: 2025-06-13T15:58:31.440Z
Reserved: 2025-06-13T12:02:40.494Z
Link: CVE-2025-6052

Updated: 2025-06-13T15:58:23.496Z

Status : Received
Published: 2025-06-13T16:15:28.230
Modified: 2025-06-13T16:15:28.230
Link: CVE-2025-6052
