CVE-2025-5278

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.
Configurations

No configuration.

History

29 May 2025, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/05/29/2 -

29 May 2025, 16:15

Type Values Removed Values Added
References
  • () https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 -
  • () https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14 -
  • () https://security-tracker.debian.org/tracker/CVE-2025-5278 -

29 May 2025, 13:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/05/29/1 -

28 May 2025, 15:01

Type Values Removed Values Added
Summary
  • (es) Se encontró una falla en GNU Coreutils. La función begfield() de la utilidad sort es vulnerable a una lectura insuficiente del búfer del montón. El programa puede acceder a memoria fuera del búfer asignado si un usuario ejecuta un comando manipulado con el formato de clave tradicional. Una entrada maliciosa podría provocar un fallo o la filtración de datos confidenciales.

28 May 2025, 01:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/05/27/2 -

27 May 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-27 21:15

Updated : 2025-05-29 18:15


NVD link : CVE-2025-5278

Mitre link : CVE-2025-5278

CVE.ORG link : CVE-2025-5278


JSON object : View

Products Affected

No product.

CWE
CWE-121

Stack-based Buffer Overflow