CVE Vulnerabilities

CVE-2025-4373

Buffer Underwrite ('Buffer Underflow')

Published: May 06, 2025 | Modified: Aug 07, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
4.8 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
Ubuntu
MEDIUM

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

Weakness

The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.

Affected Software

Name Vendor Start Version End Version
Red Hat Enterprise Linux 10 RedHat glib2-0:2.80.4-4.el10_0.6 *
Red Hat Enterprise Linux 8 RedHat glib2-0:2.56.4-166.el8_10 *
Red Hat Enterprise Linux 9 RedHat glib2-0:2.68.4-16.el9_6.2 *
Red Hat Enterprise Linux 9 RedHat glib2-0:2.68.4-16.el9_6.2 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat glib2-0:2.68.4-5.el9_0.2 *
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions RedHat glib2-0:2.68.4-7.el9_2.2 *
Red Hat Enterprise Linux 9.4 Extended Update Support RedHat glib2-0:2.68.4-14.el9_4.3 *
Red Hat Insights proxy 1.5 RedHat registry.redhat.io/insights-proxy/insights-proxy-container-rhel9:sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d *
Red Hat OpenShift distributed tracing 3.6.1 RedHat registry.redhat.io/rhosdt/jaeger-agent-rhel8:sha256:a891aa3f77d70d9d7966dfc71ff9087f45deb95d3025072da96a3ec5220db1f3 *
Red Hat OpenShift distributed tracing 3.6.1 RedHat registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8:sha256:ef03839a45320399533becb174479f9ea4f26f381202707936d576ec6fc9ba84 *
Red Hat OpenShift distributed tracing 3.6.1 RedHat registry.redhat.io/rhosdt/jaeger-collector-rhel8:sha256:3dc773cc4a48041bfe69b516db58d2a5060059725351fc1dbcece64778a35b3a *
Red Hat OpenShift distributed tracing 3.6.1 RedHat registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8:sha256:d0ee4c371754848f57e6b7c5fcf716a7d830cd72b65b8aeb30e78a8e26b40548 *
Red Hat OpenShift distributed tracing 3.6.1 RedHat registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8:sha256:57d3bf93431295f0d3c8747fe376cdb0a06dc344dd1d6b0c838f732bd920c73e *
Red Hat OpenShift distributed tracing 3.6.1 RedHat registry.redhat.io/rhosdt/jaeger-ingester-rhel8:sha256:2e6d535aa3208ca8ae1bc588393c8bc499c4bfb452aceca047523502ddffa0ed *
Red Hat OpenShift distributed tracing 3.6.1 RedHat registry.redhat.io/rhosdt/jaeger-operator-bundle:sha256:be3feca3b19ac609e5ef829887b6d03ca3c504163ed0f9e10b2410cdfb175b72 *
Red Hat OpenShift distributed tracing 3.6.1 RedHat registry.redhat.io/rhosdt/jaeger-query-rhel8:sha256:201d1bd33f7e22c463aaf94b4f84e4610f129affd8a96efb8722aabfbc612bfd *
Red Hat OpenShift distributed tracing 3.6.1 RedHat registry.redhat.io/rhosdt/jaeger-rhel8-operator:sha256:b29bd499f9889e6de6728e4f8e5d18bf59ed8bd46c6fb598bf6fee150bf49449 *
Glib2.0 Ubuntu esm-infra/focal *
Glib2.0 Ubuntu focal *
Glib2.0 Ubuntu jammy *
Glib2.0 Ubuntu noble *
Glib2.0 Ubuntu oracular *
Glib2.0 Ubuntu plucky *
Glib2.0 Ubuntu upstream *

Potential Mitigations

References