Impact
The vulnerability is an integer overflow in glib's GIO escape_byte_string() which results in a heap buffer overflow. When malicious file or remote filesystem attribute values are processed, the overflow can crash the application, causing a denial of service. This weakness is classified as an Integer Overflow (CWE‑190).
Affected Systems
Affected systems include GNOME glib, Red Hat Enterprise Linux versions 6 through 10, Red Hat Hardened Images, and Red Hat OpenShift Container Platform 4. The Common Platform Enumeration entries list all major releases of the platforms, but no specific glib version numbers are provided in the advisory.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. With an EPSS score of less than 1 %, the likelihood of exploitation is very low, and the vulnerability is not listed in CISA KEV. The attack vector is inferred from the description: it can be triggered by providing malicious file or remote filesystem attribute values, suggesting that an attacker would need access to the file system or a process that processes such attributes. No official workaround is available, so mitigation depends on applying the vendor patch.
OpenCVE Enrichment
Debian DLA