When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.

Project Subscriptions

Vendors Products
Enterprise Linux Subscribe
Rhel E4s Subscribe
Rhel Eus Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4143-1 glibc security update
EUVD EUVD EUVD-2025-1642 When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
Ubuntu USN Ubuntu USN USN-7259-1 GNU C Library vulnerability
Ubuntu USN Ubuntu USN USN-7259-2 GNU C Library vulnerability
Ubuntu USN Ubuntu USN USN-7259-3 GNU C Library vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 04 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00271}

epss

{'score': 0.00221}


Wed, 30 Apr 2025 05:45:00 +0000

Type Values Removed Values Added
References

Tue, 29 Apr 2025 06:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel E4s
Redhat rhel Eus
CPEs cpe:/a:redhat:rhel_e4s:9.0
cpe:/a:redhat:rhel_eus:9.2
cpe:/a:redhat:rhel_eus:9.4
Vendors & Products Redhat rhel E4s
Redhat rhel Eus

Mon, 28 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:9

Fri, 25 Apr 2025 02:45:00 +0000

Type Values Removed Values Added
References

Tue, 15 Apr 2025 03:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:8
Vendors & Products Redhat
Redhat enterprise Linux

Sun, 13 Apr 2025 04:45:00 +0000

Type Values Removed Values Added
References

Fri, 28 Feb 2025 13:45:00 +0000

Type Values Removed Values Added
References

Tue, 04 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Thu, 23 Jan 2025 18:45:00 +0000


Thu, 23 Jan 2025 01:45:00 +0000

Type Values Removed Values Added
Title glibc: buffer overflow in the GNU C Library's assert()
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H'}

threat_severity

Moderate


Wed, 22 Jan 2025 15:45:00 +0000


Wed, 22 Jan 2025 15:00:00 +0000


Wed, 22 Jan 2025 13:15:00 +0000

Type Values Removed Values Added
Description When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
Weaknesses CWE-131
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: glibc

Published:

Updated: 2026-02-04T20:45:35.724Z

Reserved: 2025-01-11T15:00:14.787Z

Link: CVE-2025-0395

cve-icon Vulnrichment

Updated: 2025-04-30T05:03:13.011Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-22T13:15:20.933

Modified: 2026-02-04T21:15:56.993

Link: CVE-2025-0395

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-01-22T13:11:30Z

Links: CVE-2025-0395 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses