On Thu, 08 May 2025 at 21:28:38 +0200, Salvatore Bonaccorso wrote:
The following vulnerability was published for glib2.0.

CVE-2025-4373[0]:
| A flaw was found in GLib, which is vulnerable to an integer overflow
| in the g_string_insert_unichar() function. When the position at
| which to insert the character is large, the position will overflow,
| leading to a buffer underwrite.

If I'm reading correctly, this can only happen if the string length is around 2GB in 32-bit processes, or extremely large (half the address space) in 64-bit processes, such that a gssize (same type as ssize_t) would reach a signed overflow and wrap around?

If that assessment is correct, then this doesn't seem like an urgent problem to fix, or particularly likely to be exploited in practice.

    smcv

Reply via email to