Name | CVE-2025-6052 |
Description | A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1107797 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
glib2.0 (PTS) | bullseye | 2.66.8-1+deb11u4 | fixed |
bullseye (security) | 2.66.8-1+deb11u6 | fixed | |
bookworm | 2.74.6-2+deb12u6 | fixed | |
bookworm (security) | 2.74.6-2+deb12u2 | fixed | |
trixie, sid | 2.84.3-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
glib2.0 | source | bullseye | (not affected) | |||
glib2.0 | source | bookworm | (not affected) | |||
glib2.0 | source | (unstable) | 2.84.3-1 | unimportant | 1107797 |
[bookworm] - glib2.0 <not-affected> (Vulnerable code introduced later)
[bullseye] - glib2.0 <not-affected> (Vulnerable code introduced later)
https://bugzilla.redhat.com/show_bug.cgi?id=2372666
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4655
Introduced wtih: https://gitlab.gnome.org/GNOME/glib/-/commit/34b7992fd6e3894bf6d2229b8aa59cac34bcb1b5 (2.75.3)
Fixed by: https://gitlab.gnome.org/GNOME/glib/-/commit/33d9ba2fcc907b4f9a6c0540f9976b64b6f59db2 (2.85.1)
Backport: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4656
Fixed by: https://gitlab.gnome.org/GNOME/glib/-/commit/987309f23ada52592bffdb5db0d8a5d58bd8097b (2.84.3)
Negligible security impact