A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2025-6052 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2372666 | Issue Tracking Third Party Advisory |
Configurations
History
20 Aug 2025, 17:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2025-6052 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2372666 - Issue Tracking, Third Party Advisory | |
First Time |
Gnome glib
Gnome |
|
CPE | cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:* |
16 Jun 2025, 12:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-13 16:15
Updated : 2025-08-20 17:27
NVD link : CVE-2025-6052
Mitre link : CVE-2025-6052
CVE.ORG link : CVE-2025-6052
JSON object : View
Products Affected
gnome
- glib
CWE
CWE-190
Integer Overflow or Wraparound