A vulnerability was found in GLib2.0, where DoS caused by handling a malicious text-form variant which is structured to cause looping superlinear to its text size. Applications are at risk if they parse untrusted text-form variants. References: https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835
Created glib tracking bugs for this issue: Affects: epel-all [bug 2181187] Affects: fedora-all [bug 2181191] Created glib2 tracking bugs for this issue: Affects: fedora-all [bug 2181188] Created mingw-glib2 tracking bugs for this issue: Affects: fedora-all [bug 2181192]
This CVE has been rejected, can you please remove the CVE alias as well?