{"id":"CVE-2025-4373","details":"A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.","modified":"2026-03-23T05:01:49.793046771Z","published":"2025-05-06T15:16:05.320Z","related":["ALSA-2025:11140","ALSA-2025:11327","MGASA-2025-0173","SUSE-SU-2025:01880-1","SUSE-SU-2025:02167-1","SUSE-SU-2025:02233-1","SUSE-SU-2025:02375-1","SUSE-SU-2025:20471-1","SUSE-SU-2025:20508-1"],"references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2025-4373"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:11140"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:11327"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:11374"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:12275"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:11662"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:13335"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14988"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14989"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:10855"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:11373"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14990"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14991"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2364265"},{"type":"REPORT","url":"https://gitlab.gnome.org/GNOME/glib/-/issues/3677"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-4373.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}]}