Bug 2181183

Summary: glib: DoS caused by handling a malicious text-form variant
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: carnil, mcatanza, mdean, rh-spice-bugs, virt-maint, walters
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-29 05:39:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2181187, 2181188, 2181191, 2181192, 2181199, 2181200, 2181201, 2181202    
Bug Blocks: 2160453    

Description Dhananjay Arunesh 2023-03-23 09:59:29 UTC
A vulnerability was found in GLib2.0, where DoS caused by handling a malicious text-form variant which is structured to cause looping superlinear to its text size. Applications are at risk if they parse untrusted text-form variants.

References:
https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835

Comment 1 Dhananjay Arunesh 2023-03-23 10:01:59 UTC
Created glib tracking bugs for this issue:

Affects: epel-all [bug 2181187]
Affects: fedora-all [bug 2181191]


Created glib2 tracking bugs for this issue:

Affects: fedora-all [bug 2181188]


Created mingw-glib2 tracking bugs for this issue:

Affects: fedora-all [bug 2181192]

Comment 2 Salvatore Bonaccorso 2023-07-24 07:45:13 UTC
This CVE has been rejected, can you please remove the CVE alias as well?