Impact
Libsolv contains a heap buffer overflow in the repo_add_solv function. A specially crafted .solv file that carries a negative size value can cause the function to allocate less memory than required, leading to an out‑of‑bounds write. This flaw can be leveraged by an attacker to crash the application or the host system, resulting in a denial of service. The weakness is a classic example of an uncontrolled buffer overflow (CWE-122).
Affected Systems
The vulnerability affects Red Hat products that incorporate libsolv, including RHEL 10, RHEL 7, RHEL 8, RHEL 9, Red Hat Hardened Images, Red Hat OpenShift Container Platform 4, Red Hat Satellite 6, and Red Hat Update Infrastructure 4 for Cloud Providers. All versions using the affected libsolv code are potentially impacted; the specific version numbers are not listed in the data provided.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. The EPSS score is not available, so a precise exploitation likelihood cannot be pinpointed, but the lack of a mitigating factor and the nature of the flaw suggest that an attacker could remotely trigger the overflow by supplying a malicious .solv file from an untrusted source. The vulnerability is not listed in CISA’s KEV catalog, implying that no confirmed exploits are known, yet the risk remains because any application that loads untrusted .solv files could be compromised.
OpenCVE Enrichment