CVE-2025-14104: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 10
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
AI Analysis
Technical Summary
CVE-2025-14104 is a vulnerability identified in the util-linux package of Red Hat Enterprise Linux 10, specifically within the setpwnam() function responsible for processing usernames. The flaw manifests as a heap buffer over-read when the system processes usernames exactly 256 bytes in length. This vulnerability affects SUID (Set User ID) login utilities that write to the password database, which are critical components in user authentication and management. The over-read occurs because the function does not properly validate or limit the length of the username input, leading to reading beyond the allocated heap buffer. This can cause memory corruption, potentially resulting in a denial of service (DoS) by crashing the affected utilities or the system processes that rely on them. The CVSS 3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) shows that the attack requires local access with low complexity, privileges are required but no user interaction is needed, and the impact is limited to confidentiality (partial information disclosure) and availability (high impact due to DoS), with no integrity impact. No known exploits are currently reported in the wild, suggesting limited active exploitation at this time. The vulnerability is significant because it affects core system utilities involved in authentication, which are often SUID and run with elevated privileges, increasing the risk of system instability or denial of service if exploited. Given the nature of the flaw, exploitation is limited to local attackers with some privileges, such as authenticated users or processes running with limited rights. The vulnerability does not appear to allow privilege escalation or remote code execution directly. However, the denial of service impact can disrupt critical services and user authentication workflows.
Potential Impact
For European organizations, the primary impact of CVE-2025-14104 is the potential for denial of service on systems running Red Hat Enterprise Linux 10, particularly those that rely on SUID login utilities for authentication and user management. This could lead to temporary loss of access to critical systems or services, affecting business continuity and operational stability. Confidentiality impact is limited but may include partial leakage of memory contents due to the heap over-read, which could expose sensitive information in some scenarios. The requirement for local privileges limits the attack surface to internal threat actors or compromised accounts. Organizations operating critical infrastructure, data centers, or cloud environments using RHEL 10 are at higher risk, especially if they have automated processes or scripts that depend on these utilities. The absence of known exploits in the wild reduces immediate risk, but the medium severity rating and the nature of the vulnerability warrant prompt attention. Disruption of authentication services can have cascading effects on compliance, user productivity, and incident response capabilities. The impact is more pronounced in environments with high user turnover or where usernames of unusual length might be processed, potentially triggering the vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-14104, European organizations should prioritize applying official patches from Red Hat as soon as they become available. In the interim, organizations can audit and restrict username lengths to below 256 bytes to prevent triggering the over-read condition. Review and harden access controls to limit local user privileges, reducing the number of accounts capable of exploiting this vulnerability. Implement monitoring for unusual crashes or denial of service symptoms in login utilities and related authentication services. Consider deploying application whitelisting and integrity monitoring on critical system binaries to detect unauthorized modifications or crashes. Conduct thorough testing of authentication workflows with edge-case usernames to identify potential triggers. Additionally, organizations should review their incident response plans to quickly address any denial of service incidents related to this vulnerability. For environments with high security requirements, consider isolating critical authentication services or using alternative authentication mechanisms until patches are applied. Finally, maintain up-to-date inventory of systems running Red Hat Enterprise Linux 10 to ensure comprehensive coverage of mitigation efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-14104: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 10
Description
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
AI-Powered Analysis
Technical Analysis
CVE-2025-14104 is a vulnerability identified in the util-linux package of Red Hat Enterprise Linux 10, specifically within the setpwnam() function responsible for processing usernames. The flaw manifests as a heap buffer over-read when the system processes usernames exactly 256 bytes in length. This vulnerability affects SUID (Set User ID) login utilities that write to the password database, which are critical components in user authentication and management. The over-read occurs because the function does not properly validate or limit the length of the username input, leading to reading beyond the allocated heap buffer. This can cause memory corruption, potentially resulting in a denial of service (DoS) by crashing the affected utilities or the system processes that rely on them. The CVSS 3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) shows that the attack requires local access with low complexity, privileges are required but no user interaction is needed, and the impact is limited to confidentiality (partial information disclosure) and availability (high impact due to DoS), with no integrity impact. No known exploits are currently reported in the wild, suggesting limited active exploitation at this time. The vulnerability is significant because it affects core system utilities involved in authentication, which are often SUID and run with elevated privileges, increasing the risk of system instability or denial of service if exploited. Given the nature of the flaw, exploitation is limited to local attackers with some privileges, such as authenticated users or processes running with limited rights. The vulnerability does not appear to allow privilege escalation or remote code execution directly. However, the denial of service impact can disrupt critical services and user authentication workflows.
Potential Impact
For European organizations, the primary impact of CVE-2025-14104 is the potential for denial of service on systems running Red Hat Enterprise Linux 10, particularly those that rely on SUID login utilities for authentication and user management. This could lead to temporary loss of access to critical systems or services, affecting business continuity and operational stability. Confidentiality impact is limited but may include partial leakage of memory contents due to the heap over-read, which could expose sensitive information in some scenarios. The requirement for local privileges limits the attack surface to internal threat actors or compromised accounts. Organizations operating critical infrastructure, data centers, or cloud environments using RHEL 10 are at higher risk, especially if they have automated processes or scripts that depend on these utilities. The absence of known exploits in the wild reduces immediate risk, but the medium severity rating and the nature of the vulnerability warrant prompt attention. Disruption of authentication services can have cascading effects on compliance, user productivity, and incident response capabilities. The impact is more pronounced in environments with high user turnover or where usernames of unusual length might be processed, potentially triggering the vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-14104, European organizations should prioritize applying official patches from Red Hat as soon as they become available. In the interim, organizations can audit and restrict username lengths to below 256 bytes to prevent triggering the over-read condition. Review and harden access controls to limit local user privileges, reducing the number of accounts capable of exploiting this vulnerability. Implement monitoring for unusual crashes or denial of service symptoms in login utilities and related authentication services. Consider deploying application whitelisting and integrity monitoring on critical system binaries to detect unauthorized modifications or crashes. Conduct thorough testing of authentication workflows with edge-case usernames to identify potential triggers. Additionally, organizations should review their incident response plans to quickly address any denial of service incidents related to this vulnerability. For environments with high security requirements, consider isolating critical authentication services or using alternative authentication mechanisms until patches are applied. Finally, maintain up-to-date inventory of systems running Red Hat Enterprise Linux 10 to ensure comprehensive coverage of mitigation efforts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2025-12-05T14:18:15.840Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693308e8f88dbe026cf7914e
Added to database: 12/5/2025, 4:31:36 PM
Last enriched: 12/19/2025, 5:41:12 PM
Last updated: 2/4/2026, 12:18:18 PM
Views: 202
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59818: Vulnerability in Zenitel TCIS-3+
CriticalCVE-2025-41085: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Apidog Apidog Web Platform
MediumDetecting and Monitoring OpenClaw (clawdbot, moltbot), (Tue, Feb 3rd)
MediumMalicious Script Delivering More Maliciousness, (Wed, Feb 4th)
MediumEclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.