
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in GLib's GString memory management system (CVE-2025-6052), initially reported on June 13, 2025. The flaw affects GLib versions from 2.75.3 to 2.84.3, where an integer overflow occurs in the gstringmaybe_expand() function when handling large strings (NVD Entry, Red Hat CVE).
The vulnerability is classified as CWE-190 (Integer Overflow or Wraparound) with a CVSS v3.1 base score of 3.7 (Low). The technical issue manifests in the gstringmaybe_expand() function when combining large strings with additional input, causing a hidden overflow in the size calculation. This miscalculation leads the system to incorrectly assess available memory capacity (Debian Tracker, Wiz Report).
When exploited, this vulnerability can result in data being written beyond allocated memory boundaries, potentially causing system crashes or memory corruption. The impact is considered limited due to the high complexity required for exploitation and the unusual conditions needed to trigger the vulnerability (Wiz Report).
The vulnerability has been fixed in GLib version 2.84.3 through commit 987309f23ada52592bffdb5db0d8a5d58bd8097b. For earlier versions, a backport fix is available through merge request 4656. Some distributions like Red Hat Enterprise Linux have deferred fixes for certain packages, while others are marked as not affected (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."