aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSiddhesh Poyarekar <siddhesh@sourceware.org>2025-01-21 16:48:29 -0500
committerSiddhesh Poyarekar <siddhesh@sourceware.org>2025-01-22 08:23:53 -0500
commit94e908cee9e2a5bdd04a85a36104673417a6ebd9 (patch)
treef721ad67a5fd8f6dc4951acfcd9806eff3d9d3a7
parent68ee0f704cb81e9ad0a78c644a83e1e9cd2ee578 (diff)
downloadglibc-94e908cee9e2a5bdd04a85a36104673417a6ebd9.tar.xz
glibc-94e908cee9e2a5bdd04a85a36104673417a6ebd9.zip
Add advisory text for CVE-2025-0395
Signed-off-by: Siddhesh Poyarekar <siddhesh@sourceware.org> Reviewed: Adhemerval Zanella <adhemerval.zanella@linaro.org>
-rw-r--r--advisories/GLIBC-SA-2025-000124
1 files changed, 24 insertions, 0 deletions
diff --git a/advisories/GLIBC-SA-2025-0001 b/advisories/GLIBC-SA-2025-0001
new file mode 100644
index 0000000000..3a23feea68
--- /dev/null
+++ b/advisories/GLIBC-SA-2025-0001
@@ -0,0 +1,24 @@
+assert: Buffer overflow when printing assertion failure message
+
+When the assert() function fails, it does not allocate enough space for the
+assertion failure message string and size information, which may lead to a
+buffer overflow if the message string size aligns to page size.
+
+This bug can be triggered when an assertion in a program fails. The assertion
+failure message is allocated to allow developers to see this failure in core
+dumps and it typically includes, in addition to the invariant assertion
+string and function name, the name of the program. If the name of the failing
+program is user controlled, for example on a local system, this could allow an
+attacker to control the assertion failure to trigger this buffer overflow.
+
+The only viable vector for exploitation of this bug is local, if a setuid
+program exists that has an existing bug that results in an assertion failure.
+No such program has been discovered at the time of publishing this advisory,
+but the presence of custom setuid programs, although strongly discouraged as a
+security practice, cannot be discounted.
+
+CVE-Id: CVE-2025-0395
+Public-Date: 2025-01-22
+Vulnerable-Commit: f8a3b5bf8fa1d0c43d2458e03cc109a04fdef194 (2.13-175)
+Fix-Commit: 68ee0f704cb81e9ad0a78c644a83e1e9cd2ee578 (2.41)
+Reported-By: Qualys Security Advisory