CVE-2025-4373
Published: May 6, 2025Last modified: September 3, 2025
Description
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 4.8 |
| Attack Vector | NETWORK |
| Attack complexity | HIGH |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | LOW |
| Availability impact | LOW |
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | glib | Fixed (2.74.7-r3) |
| 25 LTS | glib | Not affected (2.84.2-r0) | |
| Stream | glib | Fixed (2.84.2-r0) |
References
- https://access.redhat.com/errata/RHSA-2025:10855
- https://access.redhat.com/errata/RHSA-2025:11140
- https://access.redhat.com/errata/RHSA-2025:11327
- https://access.redhat.com/errata/RHSA-2025:11373
- https://access.redhat.com/errata/RHSA-2025:11374
- https://access.redhat.com/errata/RHSA-2025:11662
- https://access.redhat.com/errata/RHSA-2025:12275
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:14988
- https://access.redhat.com/errata/RHSA-2025:14989
- https://access.redhat.com/errata/RHSA-2025:14990
- https://access.redhat.com/errata/RHSA-2025:14991
- https://access.redhat.com/security/cve/CVE-2025-4373
- https://bugzilla.redhat.com/show_bug.cgi?id=2364265
- https://gitlab.gnome.org/GNOME/glib/-/issues/3677