Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-4373

Опубликовано: 06 мая 2025
Источник: debian
EPSS Низкий

Описание

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib2.0fixed2.84.1-3package
glib2.0no-dsabookwormpackage
glib2.0postponedbullseyepackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib/-/issues/3677

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4588

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4592

EPSS

Процентиль: 18%
0.00056
Низкий

Связанные уязвимости

CVSS3: 4.8
ubuntu
около 2 месяцев назад

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

CVSS3: 4.8
redhat
около 2 месяцев назад

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

CVSS3: 4.8
nvd
около 2 месяцев назад

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

CVSS3: 4.8
github
около 2 месяцев назад

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

EPSS

Процентиль: 18%
0.00056
Низкий