A flaw was found in how GLib’s GString manages memory...
Low severity
Unreviewed
Published
Jun 13, 2025
to the GitHub Advisory Database
•
Updated Jun 13, 2025
Description
Published by the National Vulnerability Database
Jun 13, 2025
Published to the GitHub Advisory Database
Jun 13, 2025
Last updated
Jun 13, 2025
A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.
References