Bug 2181182

Summary: glib: DoS caused by malicious serialised variant
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: carnil, mcatanza, mdean, rh-spice-bugs, virt-maint, walters
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-29 05:38:53 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2181185, 2181186, 2181189, 2181190, 2181195, 2181196, 2181197, 2181198    
Bug Blocks: 2160453    

Description Dhananjay Arunesh 2023-03-23 09:55:46 UTC
A vulnerability was found in GLib2.0, where denial of service caused by handling a malicious serialised variant which is structured to cause allocations or looping superlinear to its serialised size. Applications are at risk if they accept untrusted serialised variants by checking them with g_variant_get_normal_form() (or don’t check them).

References:
https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835

Comment 1 Dhananjay Arunesh 2023-03-23 10:01:52 UTC
Created glib tracking bugs for this issue:

Affects: epel-all [bug 2181185]
Affects: fedora-all [bug 2181189]


Created glib2 tracking bugs for this issue:

Affects: fedora-all [bug 2181186]


Created mingw-glib2 tracking bugs for this issue:

Affects: fedora-all [bug 2181190]

Comment 3 Salvatore Bonaccorso 2023-07-24 07:45:41 UTC
This CVE has been rejected, can you please remove the CVE alias as well?