CVE-2025-4373
Published: May 6, 2025Last modified: August 26, 2025
Description
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.8 |
Attack Vector | NETWORK |
Attack complexity | HIGH |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | LOW |
Availability impact | LOW |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | glib | Unknown (2.74.1-r2) |
25 LTS | glib | Not affected (2.84.2-r0) | |
Stream | glib | Fixed (2.84.2-r0) | |
Hardened Containers | 23 LTS | glib | Unknown (2.74.1-r2) |
Stream | glib | Fixed (2.84.2-r0) |
References
- https://access.redhat.com/errata/RHSA-2025:10855
- https://access.redhat.com/errata/RHSA-2025:11140
- https://access.redhat.com/errata/RHSA-2025:11327
- https://access.redhat.com/errata/RHSA-2025:11373
- https://access.redhat.com/errata/RHSA-2025:11374
- https://access.redhat.com/errata/RHSA-2025:11662
- https://access.redhat.com/errata/RHSA-2025:12275
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/security/cve/CVE-2025-4373
- https://bugzilla.redhat.com/show_bug.cgi?id=2364265
- https://gitlab.gnome.org/GNOME/glib/-/issues/3677