Impact
A flaw in WebKitGTK and WPE WebKit permits an out‑of‑bounds read coupled with an integer underflow. The vulnerability is triggered by a crafted payload sent to an application’s GLib remote inspector server, causing the UIProcess to crash. The crash results in a denial‑of‑service condition for the affected application or system.
Affected Systems
This vulnerability affects several Red Hat Enterprise Linux releases, including RHEL 6, RHEL 7, RHEL 7 Extended Lifecycle Support, RHEL 8, RHEL 8.2 Advanced Update Support, RHEL 8.4 Advanced Mission Critical Update Support, RHEL 8.4 Extended Update Support Long‑Life Add‑On, RHEL 8.6 Advanced Mission Critical Update Support, RHEL 8.6 Telecommunications Update Service, RHEL 8.6 Update Services for SAP Solutions, RHEL 8.8 Telecommunications Update Service, RHEL 8.8 Update Services for SAP Solutions, RHEL 9, RHEL 9.0 Update Services for SAP Solutions, RHEL 9.2 Update Services for SAP Solutions, RHEL 9.4 Extended Update Support, RHEL 9.6 Extended Update Support and the WebKitGTK Team’s webkitgtk product. All these platforms deploy the WebKitGTK or WPE WebKit components that contain the vulnerability.
Risk and Exploitability
The CVSS score of 7.5 indicates a high impact rating, while the EPSS score of less than 1% suggests a very low probability of exploitation at the time of the analysis. The vulnerability is not listed in CISA’s KEV catalog. Attacks appear to be carried out by sending a malicious payload to the GLib remote inspector server, implying that the exploit requires either remote or local access to an application that exposes this server. The crash leads to service unavailability, potentially impacting downstream users.
OpenCVE Enrichment