NIXPKGS-2025-0008
published on 1 Nov 2025
Permalink
CVE-2025-7039
3.7 LOW
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse accepted
-
@LeSuisse
removed
12 packages
- bootc
- loupe
- rpm-ostree
- podman-bootc
- mlxbf-bootctl
- glycin-loaders
- systemd-bootchart
- rubyPackages.glib2
- rubyPackages_3_1.glib2
- rubyPackages_3_2.glib2
- rubyPackages_3_3.glib2
- rubyPackages_3_4.glib2
- @LeSuisse published on GitHub
Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()
A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
References
- https://access.redhat.com/security/cve/CVE-2025-7039 x_refsource_REDHAT vdb-entry
- RHBZ#2392423 issue-tracking x_refsource_REDHAT
Affected products
bootc
glib2
loupe
librsvg2
rpm-ostree
mingw-glib2
glycin-loaders