Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5278: Stack-based Buffer Overflow

0
Medium
VulnerabilityCVE-2025-5278cvecve-2025-5278
Published: Tue May 27 2025 (05/27/2025, 20:52:58 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

AI-Powered Analysis

AILast updated: 01/23/2026, 19:25:20 UTC

Technical Analysis

CVE-2025-5278 is a vulnerability identified in the GNU Coreutils package, specifically within the sort utility's begfield() function. The issue is a heap buffer under-read, which occurs when the program accesses memory outside the bounds of an allocated buffer. This happens when a user executes a crafted sort command using the traditional key format, which manipulates the internal parsing logic of begfield(). The flaw does not require elevated privileges but does require local access and user interaction to trigger. The vulnerability can cause the sort utility to crash or potentially leak sensitive information from adjacent memory regions. The affected product is Red Hat Enterprise Linux 10, version 7.2, which bundles GNU Coreutils. The CVSS 3.1 base score is 4.4, indicating a medium severity with a vector of AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L, meaning local attack vector, low complexity, no privileges required, user interaction required, unchanged scope, limited confidentiality impact, no integrity impact, and limited availability impact. No public exploits have been reported yet, and no patches are linked in the provided data, though Red Hat is the vendor responsible for addressing this issue.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to systems running Red Hat Enterprise Linux 10 version 7.2, especially those that utilize the sort utility in automated scripts or user-driven processes involving traditional key format sorting. The potential impact includes system instability due to crashes and the risk of sensitive data leakage from memory, which could expose confidential information. While the attack requires local access and user interaction, insider threats or compromised user accounts could exploit this flaw. The limited scope and absence of remote exploitation reduce the overall risk, but critical infrastructure or data centers relying on affected systems could experience disruptions or data exposure. Organizations in sectors such as finance, government, and critical infrastructure in Europe should be particularly vigilant due to the sensitivity of their data and regulatory requirements around data protection.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor Red Hat advisories closely and apply patches promptly once available, as no patch links are currently provided. 2) Restrict local user access to systems running Red Hat Enterprise Linux 10 version 7.2, especially limiting the ability to execute crafted sort commands. 3) Audit and review scripts and applications that utilize the sort utility with traditional key formats to detect and prevent malicious input. 4) Employ application whitelisting and input validation to reduce the risk of crafted commands reaching the vulnerable function. 5) Use system-level protections such as Address Space Layout Randomization (ASLR) and stack canaries to mitigate exploitation impact. 6) Implement robust user activity monitoring to detect unusual command executions that could indicate exploitation attempts. 7) Educate users about the risks of executing untrusted commands locally to reduce inadvertent triggering of the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-27T14:05:48.552Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68362775182aa0cae2250913

Added to database: 5/27/2025, 8:58:29 PM

Last enriched: 1/23/2026, 7:25:20 PM

Last updated: 2/2/2026, 9:09:38 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933

Unknown
VulnerabilityMon Feb 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats