Impact
A flaw in the gix-date library causes the TimeBuf::as_str routine to generate strings that contain non‑UTF8 characters. The malformed strings violate internal safety invariants, triggering undefined behavior when processed by the application. This can lead to crashes, unresponsiveness, or other unpredictable behaviors, impacting the reliability of the affected software.
Affected Systems
The vulnerability affects GitoxideLabs’s gitoxide repository and components that rely on gix-date. It also impacts Red Hat Logging Subsystem for OpenShift and Red Hat Enterprise Linux versions 8, 9, and 10. No specific version numbers are listed, so all releases that contain the affected gix-date component should be considered potentially impacted.
Risk and Exploitability
The base CVSS score is 7.1, indicating a high severity. Exploit probability is low, with an EPSS score below 1 %. The issue is not catalogued in the CISA KEV list. The likely attack vector is inferred: any code path that parses or generates time strings using gix-date—such as log ingestion, Git operations, or time‑related processing—could be used to supply crafted input that triggers the undefined behavior. Once triggered, the vulnerability could destabilize the application or accidentally expose internal state through fault handling.
OpenCVE Enrichment
Github GHSA