When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
History

Wed, 30 Apr 2025 05:45:00 +0000

Type Values Removed Values Added
References

Tue, 29 Apr 2025 06:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel E4s
Redhat rhel Eus
CPEs cpe:/a:redhat:rhel_e4s:9.0
cpe:/a:redhat:rhel_eus:9.2
cpe:/a:redhat:rhel_eus:9.4
Vendors & Products Redhat rhel E4s
Redhat rhel Eus

Mon, 28 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:9

Fri, 25 Apr 2025 02:45:00 +0000

Type Values Removed Values Added
References

Tue, 15 Apr 2025 03:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:8
Vendors & Products Redhat
Redhat enterprise Linux

Sun, 13 Apr 2025 04:45:00 +0000

Type Values Removed Values Added
References

Fri, 28 Feb 2025 13:45:00 +0000

Type Values Removed Values Added
References

Tue, 04 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Thu, 23 Jan 2025 18:45:00 +0000


Thu, 23 Jan 2025 01:45:00 +0000

Type Values Removed Values Added
Title glibc: buffer overflow in the GNU C Library's assert()
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H'}

threat_severity

Moderate


Wed, 22 Jan 2025 15:45:00 +0000


Wed, 22 Jan 2025 15:00:00 +0000


Wed, 22 Jan 2025 13:15:00 +0000

Type Values Removed Values Added
Description When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
Weaknesses CWE-131
References

cve-icon MITRE

Status: PUBLISHED

Assigner: glibc

Published: 2025-01-22T13:11:30.406Z

Updated: 2025-04-30T05:03:13.011Z

Reserved: 2025-01-11T15:00:14.787Z

Link: CVE-2025-0395

cve-icon Vulnrichment

Updated: 2025-04-30T05:03:13.011Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-22T13:15:20.933

Modified: 2025-04-30T05:15:46.707

Link: CVE-2025-0395

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-01-22T13:11:30Z

Links: CVE-2025-0395 - Bugzilla