A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.
{ "priority_reason": "This is a low-severity issue", "availability": "No subscription required", "binaries": [ { "binary_name": "libglib2.0-0", "binary_version": "2.72.4-0ubuntu2.5" }, { "binary_name": "libglib2.0-0-dbgsym", "binary_version": "2.72.4-0ubuntu2.5" }, { "binary_name": "libglib2.0-bin", "binary_version": "2.72.4-0ubuntu2.5" }, { "binary_name": "libglib2.0-bin-dbgsym", "binary_version": "2.72.4-0ubuntu2.5" }, { "binary_name": "libglib2.0-data", "binary_version": "2.72.4-0ubuntu2.5" }, { "binary_name": "libglib2.0-dev", "binary_version": "2.72.4-0ubuntu2.5" }, { "binary_name": "libglib2.0-dev-bin", "binary_version": "2.72.4-0ubuntu2.5" }, { "binary_name": "libglib2.0-dev-bin-dbgsym", "binary_version": "2.72.4-0ubuntu2.5" }, { "binary_name": "libglib2.0-doc", "binary_version": "2.72.4-0ubuntu2.5" }, { "binary_name": "libglib2.0-tests", "binary_version": "2.72.4-0ubuntu2.5" }, { "binary_name": "libglib2.0-tests-dbgsym", "binary_version": "2.72.4-0ubuntu2.5" } ] }