Search for packages
purl | pkg:deb/debian/glib2.0@2.84.2-1 |
Tags | Ghost |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-bd14-mb9b-9ua8
Aliases: CVE-2025-6052 |
A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-06-22T03:59:58.098970+00:00 | Debian Importer | Fixing | VCID-qaja-aa9k-1yeb | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-20T21:05:53.955259+00:00 | Debian Importer | Affected by | VCID-bd14-mb9b-9ua8 | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-01T12:50:11.611119+00:00 | Debian Importer | Fixing | VCID-qaja-aa9k-1yeb | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |