CVE-2025-13601
BaseFortify
Publication date: 2025-11-26
Last updated on: 2026-04-19
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| redhat | openshift_container_platform_for_power | 4.12 |
| redhat | openshift_container_platform | 4.12 |
| redhat | openshift_container_platform_for_linuxone | 4.12 |
| redhat | openshift_container_platform_for_arm64 | 4.12 |
| redhat | openshift_container_platform | 4.17 |
| redhat | openshift_container_platform | 4.16 |
| redhat | openshift_container_platform_for_ibm_z | 4.12 |
| redhat | openshift_container_platform_for_arm64 | 4.16 |
| redhat | openshift_container_platform_for_ibm_z | 4.16 |
| redhat | openshift_container_platform_for_linuxone | 4.16 |
| redhat | openshift_container_platform_for_power | 4.16 |
| redhat | openshift_container_platform | 4.18 |
| redhat | openshift_container_platform_for_arm64 | 4.17 |
| redhat | openshift_container_platform_for_arm64 | 4.18 |
| redhat | openshift_container_platform_for_ibm_z | 4.17 |
| redhat | openshift_container_platform_for_ibm_z | 4.18 |
| redhat | openshift_container_platform_for_linuxone | 4.17 |
| redhat | openshift_container_platform_for_linuxone | 4.18 |
| redhat | openshift_container_platform_for_power | 4.17 |
| redhat | openshift_container_platform_for_power | 4.18 |
| redhat | openshift_container_platform | 4.19 |
| redhat | openshift_container_platform_for_arm64 | 4.19 |
| redhat | openshift_container_platform_for_ibm_z | 4.19 |
| redhat | openshift_container_platform_for_linuxone | 4.19 |
| redhat | openshift_container_platform_for_power | 4.19 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-190 | The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a heap-based buffer overflow in the glib library's g_escape_uri_string() function. It occurs because the function incorrectly calculates the buffer size needed when escaping a string that contains a very large number of characters requiring escaping. This miscalculation can cause the length calculation to overflow, leading to writing beyond the allocated memory buffer.
How can this vulnerability impact me? :
The vulnerability can lead to a heap-based buffer overflow, which may allow an attacker to write data beyond the allocated buffer. This can result in potential memory corruption, causing application crashes or enabling an attacker to execute arbitrary code, thereby compromising the integrity and availability of the affected system.