MGASA-2025-0216

Source
https://advisories.mageia.org/MGASA-2025-0216.html
Import Source
https://advisories.mageia.org/MGASA-2025-0216.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2025-0216
Related
Published
2025-08-02T04:54:08Z
Modified
2025-08-02T04:04:22Z
Summary
Updated glib2.0 packages fix security vulnerability
Details

A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.

References
Credits

Affected packages

Mageia:9 / glib2.0

Package

Name
glib2.0
Purl
pkg:rpm/mageia/glib2.0?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.76.3-1.5.mga9

Ecosystem specific

{
    "section": "core"
}