Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4143-1 | glibc security update |
EUVD |
EUVD-2025-1642 | When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size. |
Ubuntu USN |
USN-7259-1 | GNU C Library vulnerability |
Ubuntu USN |
USN-7259-2 | GNU C Library vulnerability |
Ubuntu USN |
USN-7259-3 | GNU C Library vulnerability |
Tue, 12 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 04 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 30 Apr 2025 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 29 Apr 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel E4s
Redhat rhel Eus |
|
| CPEs | cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.4 |
|
| Vendors & Products |
Redhat rhel E4s
Redhat rhel Eus |
Mon, 28 Apr 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
Fri, 25 Apr 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 15 Apr 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:8 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Sun, 13 Apr 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 28 Feb 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Thu, 23 Jan 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 23 Jan 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | glibc: buffer overflow in the GNU C Library's assert() | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 22 Jan 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Jan 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Jan 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size. | |
| Weaknesses | CWE-131 | |
| References |
|
Status: PUBLISHED
Assigner: glibc
Published:
Updated: 2026-05-12T12:02:14.596Z
Reserved: 2025-01-11T15:00:14.787Z
Link: CVE-2025-0395
Updated: 2025-04-30T05:03:13.011Z
Status : Deferred
Published: 2025-01-22T13:15:20.933
Modified: 2026-05-12T13:16:27.947
Link: CVE-2025-0395
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN