Urgent GLib Vulnerabilities GLSA-202311-18 Demand Immediate Action
Summary
Multiple vulnerabilities have been discovered in GLib. Please review the
referenced CVEs for details.
Resolution
All GLib users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/glib-2.74.4"
References
[ 1 ] CVE-2023-29499
https://nvd.nist.gov/vuln/detail/CVE-2023-29499
[ 2 ] CVE-2023-32611
https://nvd.nist.gov/vuln/detail/CVE-2023-32611
[ 3 ] CVE-2023-32665
https://nvd.nist.gov/vuln/detail/CVE-2023-32665
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202311-18
Concerns
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
Background
GLib is a library providing a number of GNOME's core objects and
functions.
Affected Packages
Package Vulnerable Unaffected
------------- ------------ ------------
dev-libs/glib < 2.74.4 >= 2.74.4
Impact
GVariant deserialization is vulnerable to an exponential blowup issue
where a crafted GVariant can cause excessive processing, leading to
denial of service.
GVariant deserialization fails to validate that the input conforms to
the expected format, leading to denial of service.
GVariant deserialization is vulnerable to a slowdown issue where a
crafted GVariant can cause excessive processing, leading to denial of
service.
Workaround
There is no known workaround at this time.