A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
Workaround:
The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2025-4373 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2364265 | issue tracking |