A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-6052 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2372666 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-06-13 16:15
Updated : 2025-08-20 17:27
NVD link : CVE-2025-6052
Mitre link : CVE-2025-6052
CVE.ORG link : CVE-2025-6052
JSON object : View
Products Affected
gnome
- glib
CWE
CWE-190
Integer Overflow or Wraparound
