CVE-2025-6052
Severity
7.5HIGH
EPSS
0.3%
top 46.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 13
Latest updateJan 15
Description
A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 2.2 | Impact: 1.4
Affected Packages2 packages
🔴Vulnerability Details
3GHSA▶
GHSA-99rj-3595-5frj: A flaw was found in how GLib’s GString manages memory when adding data to strings↗2025-06-13
CVEList▶
Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring↗2025-06-13
OSV▶
CVE-2025-6052: A flaw was found in how GLib’s GString manages memory when adding data to strings↗2025-06-13
📋Vendor Advisories
5Red Hat▶
glib: Integer overflow in g_string_maybe_expand() leading to potential buffer overflow in GLib GString↗2025-06-13
Microsoft▶
Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring↗2025-06-10
Debian▶
CVE-2025-6052: glib2.0 - A flaw was found in how GLib’s GString manages memory when adding data to string...↗2025