A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat Enterprise Linux 10 | RedHat | glib2-0:2.80.4-4.el10_0.6 | * |
Glib2.0 | Ubuntu | focal | * |
Glib2.0 | Ubuntu | jammy | * |
Glib2.0 | Ubuntu | noble | * |
Glib2.0 | Ubuntu | oracular | * |
Glib2.0 | Ubuntu | plucky | * |
Glib2.0 | Ubuntu | upstream | * |