Metrics
Affected Vendors & Products
Sun, 13 Apr 2025 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 28 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 04 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
ssvc
|
Thu, 23 Jan 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 23 Jan 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | glibc: buffer overflow in the GNU C Library's assert() | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 22 Jan 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 22 Jan 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 22 Jan 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size. | |
Weaknesses | CWE-131 | |
References |
|

Status: PUBLISHED
Assigner: glibc
Published:
Updated: 2025-04-13T03:00:13.920Z
Reserved: 2025-01-11T15:00:14.787Z
Link: CVE-2025-0395

Updated: 2025-04-13T03:00:13.920Z

Status : Awaiting Analysis
Published: 2025-01-22T13:15:20.933
Modified: 2025-04-13T04:15:15.777
Link: CVE-2025-0395
