Impact
A flaw in the implementation of the wide‑character pushback function _IO_wdefault_pbackfail leads the ungetwc() routine to operate on the regular character buffer instead of the wide‑stream read pointer, resulting in an under‑read of memory preceding the buffer. The under‑read can expose neighboring data on the heap or, if the pointer is null, cause a crash. This weakness is identified as CWE‑125 – Buffer Under‑read and CWE‑127 – Buffer Under‑read.
Affected Systems
The GNU C Library glibc, versions 2.43 and earlier, are affected. Any distribution shipping these versions is vulnerable. Newer releases (2.44 and later) include the fix and are not impacted.
Risk and Exploitability
The EPSS score is <1% and the vulnerability is not listed in CISA KEV. The CVSS score is 7.5, indicating a moderate to high severity; this flaw can be triggered by calling ungetwc on a FILE stream that processes wide characters in an encoding where single‑byte and multi‑byte representations overlap. An attacker would need to supply such input to a vulnerable program, enabling retrieval of memory adjacent to the buffer or causing a crash. The potential impact ranges from unintentional data disclosure to denial of service, warranting prompt remediation.
OpenCVE Enrichment