Impact
The vulnerability stems from an integer overflow in GLib’s Unicode case conversion routine. When an application supplies an unusually large Unicode string, the calculation of the required memory size wraps around, causing an undersized allocation. This overflow allows the program to write beyond the end of the buffer, corrupting memory and potentially leading to process crashes or instability for any software that uses the affected GLib function.
Affected Systems
Red Hat Enterprise Linux releases 6, 7, 8, 9, and 10 are affected. The flaw resides in the GLib component shipped with these distributions; no specific GLib version is identified, so all releases containing the vulnerable code are impacted until the vendor issues a fix.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate severity, while the EPSS score below 1 % suggests a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Because the flaw is triggered by processing specially crafted Unicode input, the attack vector is inferred to be a local or application-level channel that can receive untrusted data. No public exploits have been reported, and the primary consequence is memory corruption that may destabilize applications rather than enable remote code execution.
OpenCVE Enrichment
Debian DLA