Bug 2181182 - glib: DoS caused by malicious serialised variant
Summary: glib: DoS caused by malicious serialised variant
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2181185 2181186 2181189 2181190 2181195 2181196 2181197 2181198
Blocks: 2160453
TreeView+ depends on / blocked
 
Reported: 2023-03-23 09:55 UTC by Dhananjay Arunesh
Modified: 2023-10-24 20:16 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-05-29 05:38:53 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2023-03-23 09:55:46 UTC
A vulnerability was found in GLib2.0, where denial of service caused by handling a malicious serialised variant which is structured to cause allocations or looping superlinear to its serialised size. Applications are at risk if they accept untrusted serialised variants by checking them with g_variant_get_normal_form() (or don’t check them).

References:
https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835

Comment 1 Dhananjay Arunesh 2023-03-23 10:01:52 UTC
Created glib tracking bugs for this issue:

Affects: epel-all [bug 2181185]
Affects: fedora-all [bug 2181189]


Created glib2 tracking bugs for this issue:

Affects: fedora-all [bug 2181186]


Created mingw-glib2 tracking bugs for this issue:

Affects: fedora-all [bug 2181190]

Comment 3 Salvatore Bonaccorso 2023-07-24 07:45:41 UTC
This CVE has been rejected, can you please remove the CVE alias as well?


Note You need to log in before you can comment on or make changes to this bug.