[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-225 --- glib2

ID: oval:org.secpod.oval:def:19500270Date: (C)2024-01-04   (M)2024-04-29
Class: PATCHFamily: unix




The upstream bug report describes this issue as follows:A vulnerability was found in GLib2.0, where DoS caused by handling a malicious text-form variant which is structured to cause looping superlinear to its text size. Applications are at risk if they parse untrusted text-form variants. The upstream bug report describes this issue as follows:A vulnerability was found in GLib2.0, where DoS caused by handling a malicious text-form variant which is structured to cause looping superlinear to its text size. Applications are at risk if they parse untrusted text-form variants. GLib's GVariant deserialization prior to GLib 2.74.4 failed to validate the input conforms to the expected format, leading to denial of service. GLib's GVariant deserialization prior to GLib 2.74.4 is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service. GLib's GVariant deserialization prior to GLib 2.74.4 is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service

Platform:
Amazon Linux 2023
Product:
glib2
Reference:
ALAS2023-2023-225
CVE-2023-25180
CVE-2023-29499
CVE-2023-32611
CVE-2023-32665
CVE    4
CVE-2023-29499
CVE-2023-32665
CVE-2023-32611
CVE-2023-25180
...
CPE    1
cpe:/a:gtk:glib2

© SecPod Technologies