CVE-2025-6052

A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2025-6052 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2372666 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-06-13 16:15

Updated : 2025-08-20 17:27


NVD link : CVE-2025-6052

Mitre link : CVE-2025-6052

CVE.ORG link : CVE-2025-6052


JSON object : View

Products Affected

gnome

  • glib
CWE
CWE-190

Integer Overflow or Wraparound