Bug#1107797: glib2.0: CVE-2025-6052
Simon McVittie
smcv at debian.org
Sat Jun 14 23:15:00 BST 2025
On Sat, 14 Jun 2025 at 22:51:55 +0200, Salvatore Bonaccorso wrote:
>[1] https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4655
I don't think this is plausibly attacker-triggerable: it would require
an attacker to be able to cause succesful (!) allocation of a GString
object, and some data to append to it, that add up to more than the
total address space (4 GiB on 32-bit, or 2**64 bytes on 64-bit).
On 64-bit, there's no reasonable scenario where we would run out of
address space before running out of actual memory.
On 32-bit, the only way I can think of for the length calculation to
overflow would be if there is an attacker-triggerable way to append an
arbitrarily large substring of the target string (or the entire target
string) to itself; otherwise the current size of the GString, plus the
characters that are to be appended, must already both fit in virtual
memory and therefore can't possibly add up to more than the limit of
size_t (even if we ignore the parts of virtual memory that are used for
other things: the kernel, the program, and GLib itself). I'm not at all
convinced that a program containing that pattern exists.
So I don't think this is urgent to fix.
smcv
More information about the pkg-gnome-maintainers
mailing list