diff options
| author | Praveen Kumar <praveen.kumar@windriver.com> | 2025-05-23 12:06:39 +0530 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2025-05-28 08:46:32 -0700 |
| commit | 097732e0574126222472eeabda9417072b5ac3f8 (patch) | |
| tree | 51db615babc41936708345dd97de75fb812012c5 /documentation | |
| parent | ef632f46930cd5e8a455fdefad18b921c5ef6625 (diff) | |
| download | poky-097732e0574126222472eeabda9417072b5ac3f8.tar.gz | |
glib-2.0: fix CVE-2025-4373
A flaw was found in GLib, which is vulnerable to an integer overflow
in the g_string_insert_unichar() function. When the position at which
to insert the character is large, the position will overflow, leading
to a buffer underwrite.
References:
https://nvd.nist.gov/vuln/detail/CVE-2025-4373
https://security-tracker.debian.org/tracker/CVE-2025-4373
Upstream-patches:
https://gitlab.gnome.org/GNOME/glib/-/commit/cc647f9e46d55509a93498af19659baf9c80f2e3
https://gitlab.gnome.org/GNOME/glib/-/commit/4d435bb4809793c445846db8fb87e3c9184c4703
(From OE-Core rev: 7a7319745637d4b681935ae71706dcc467df3040)
Signed-off-by: Praveen Kumar <praveen.kumar@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'documentation')
0 files changed, 0 insertions, 0 deletions
