A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Glib2.0 | Ubuntu | focal | * |
Glib2.0 | Ubuntu | jammy | * |
Glib2.0 | Ubuntu | noble | * |
Glib2.0 | Ubuntu | oracular | * |
Glib2.0 | Ubuntu | plucky | * |