A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
Workaround:
The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:10855 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:11140 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:11327 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:11373 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:11374 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:11662 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:12275 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:13335 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2025-4373 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2364265 | issue tracking |
https://gitlab.gnome.org/GNOME/glib/-/issues/3677 |