{"id":"CVE-2025-6052","details":"A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.","aliases":["BIT-java-2025-6052","BIT-java-min-2025-6052","BIT-jre-2025-6052"],"modified":"2026-05-08T07:56:45.633573484Z","published":"2025-06-13T16:15:28.230Z","related":["SUSE-SU-2025:02167-1","SUSE-SU-2025:20508-1","SUSE-SU-2025:20673-1","openSUSE-SU-2025:15221-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2025-6052"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2372666"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gnome/glib","events":[{"introduced":"b65044c52b78fab65a0415e2148f4b98a1680da2"},{"last_affected":"78cd78d2988616d9af0e8f43e703717d092cd3ff"}],"database_specific":{"versions":[{"introduced":"2.75.3"},{"last_affected":"2.84.3"}]}}],"versions":["2.75.3","2.75.4","2.76.0","2.76.1","2.77.0","2.77.1","2.77.2","2.77.3","2.78.0","2.79.0","2.79.1","2.79.2","2.79.3","2.80.0","2.81.0","2.81.2","2.83.0","2.83.1","2.83.2","2.83.3","2.83.4","2.83.5","2.84.0","2.84.1","2.84.2","2.84.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-6052.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}