Metrics
Affected Vendors & Products
Fri, 28 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 04 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
ssvc
|
Thu, 23 Jan 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 23 Jan 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | glibc: buffer overflow in the GNU C Library's assert() | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 22 Jan 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 22 Jan 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 22 Jan 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size. | |
Weaknesses | CWE-131 | |
References |
|

Status: PUBLISHED
Assigner: glibc
Published: 2025-01-22T13:11:30.406Z
Updated: 2025-02-28T13:07:31.672Z
Reserved: 2025-01-11T15:00:14.787Z
Link: CVE-2025-0395

Updated: 2025-02-28T13:07:31.672Z

Status : Awaiting Analysis
Published: 2025-01-22T13:15:20.933
Modified: 2025-02-28T13:15:26.860
Link: CVE-2025-0395
