CVE-2025-6052

NameCVE-2025-6052
DescriptionA flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1107797

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glib2.0 (PTS)bullseye2.66.8-1+deb11u4fixed
bullseye (security)2.66.8-1+deb11u6fixed
bookworm2.74.6-2+deb12u6fixed
bookworm (security)2.74.6-2+deb12u2fixed
trixie, sid2.84.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glib2.0sourcebullseye(not affected)
glib2.0sourcebookworm(not affected)
glib2.0source(unstable)2.84.3-1unimportant1107797

Notes

[bookworm] - glib2.0 <not-affected> (Vulnerable code introduced later)
[bullseye] - glib2.0 <not-affected> (Vulnerable code introduced later)
https://bugzilla.redhat.com/show_bug.cgi?id=2372666
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4655
Introduced wtih: https://gitlab.gnome.org/GNOME/glib/-/commit/34b7992fd6e3894bf6d2229b8aa59cac34bcb1b5 (2.75.3)
Fixed by: https://gitlab.gnome.org/GNOME/glib/-/commit/33d9ba2fcc907b4f9a6c0540f9976b64b6f59db2 (2.85.1)
Backport: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4656
Fixed by: https://gitlab.gnome.org/GNOME/glib/-/commit/987309f23ada52592bffdb5db0d8a5d58bd8097b (2.84.3)
Negligible security impact

Search for package or bug name: Reporting problems