CVE Vulnerabilities

CVE-2025-4373

Buffer Underwrite ('Buffer Underflow')

Published: May 06, 2025 | Modified: Sep 02, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
4.8 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

Weakness

The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.

Affected Software

NameVendorStart VersionEnd Version
Red Hat Enterprise Linux 10RedHatglib2-0:2.80.4-4.el10_0.6*
Red Hat Enterprise Linux 8RedHatglib2-0:2.56.4-166.el8_10*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatglib2-0:2.56.4-8.el8_2.2*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatglib2-0:2.56.4-10.el8_4.2*
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRedHatglib2-0:2.56.4-10.el8_4.2*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatglib2-0:2.56.4-158.el8_6.2*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatglib2-0:2.56.4-158.el8_6.2*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatglib2-0:2.56.4-158.el8_6.2*
Red Hat Enterprise Linux 8.8 Telecommunications Update ServiceRedHatglib2-0:2.56.4-162.el8_8*
Red Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRedHatglib2-0:2.56.4-162.el8_8*
Red Hat Enterprise Linux 9RedHatglib2-0:2.68.4-16.el9_6.2*
Red Hat Enterprise Linux 9RedHatglib2-0:2.68.4-16.el9_6.2*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatglib2-0:2.68.4-5.el9_0.2*
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRedHatglib2-0:2.68.4-7.el9_2.2*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatglib2-0:2.68.4-14.el9_4.3*
Red Hat Insights proxy 1.5RedHatinsights-proxy/insights-proxy-container-rhel9:sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7*
Red Hat OpenShift distributed tracing 3.6.0RedHatrhosdt/jaeger-agent-rhel8:sha256:a891aa3f77d70d9d7966dfc71ff9087f45deb95d3025072da96a3ec5220db1f3*
Red Hat OpenShift distributed tracing 3.6.0RedHatrhosdt/jaeger-all-in-one-rhel8:sha256:d9ca4a9ec5bc8de23e4550387f822f19949cdfbc4aeeab20e07b206d92f4a426*
Red Hat OpenShift distributed tracing 3.6.0RedHatrhosdt/jaeger-collector-rhel8:sha256:3dc773cc4a48041bfe69b516db58d2a5060059725351fc1dbcece64778a35b3a*
Red Hat OpenShift distributed tracing 3.6.0RedHatrhosdt/jaeger-es-index-cleaner-rhel8:sha256:3d98512aaa924e0e1c9f3b5ab6b405cb4f4a3f3b5225aefa54f1b2abfbe3d769*
Red Hat OpenShift distributed tracing 3.6.0RedHatrhosdt/jaeger-es-rollover-rhel8:sha256:fe1c8fe5bdc4114a4718812d718fc6b913465e23fd39cf6aa05acb352bd80874*
Red Hat OpenShift distributed tracing 3.6.0RedHatrhosdt/jaeger-ingester-rhel8:sha256:2e6d535aa3208ca8ae1bc588393c8bc499c4bfb452aceca047523502ddffa0ed*
Red Hat OpenShift distributed tracing 3.6.0RedHatrhosdt/jaeger-operator-bundle:sha256:be3feca3b19ac609e5ef829887b6d03ca3c504163ed0f9e10b2410cdfb175b72*
Red Hat OpenShift distributed tracing 3.6.0RedHatrhosdt/jaeger-query-rhel8:sha256:03f040cf94f7d8125f2e68bde45faa956dc9e70fef6307313e42af5de9bbfda0*
Red Hat OpenShift distributed tracing 3.6.0RedHatrhosdt/jaeger-rhel8-operator:sha256:8d7c966e19b03dc4b7f123c9f4096ed4267be5596d08958f4c75a88b3bc541da*
Glib2.0Ubuntuesm-infra/focal*
Glib2.0Ubuntufocal*
Glib2.0Ubuntujammy*
Glib2.0Ubuntunoble*
Glib2.0Ubuntuoracular*
Glib2.0Ubuntuplucky*
Glib2.0Ubuntuupstream*

Potential Mitigations

References