{
  "threat_severity" : "Low",
  "public_date" : "2022-12-14T00:00:00Z",
  "bugzilla" : {
    "description" : "glib: GVariant offset table entry size is not checked in is_normal()",
    "id" : "2211828",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2211828"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.2",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-502",
  "details" : [ "A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.", "A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service." ],
  "statement" : "This vulnerability allows for a denial of service attack to be performed against applications that process  untrusted GVariant input, compromising application availability by consuming excessive processing time or utilizing a large quantity of memory. The most likely threat is from a local user, which may be possible depending on the configuration of the service and the format of parameters that it expects. While a remote attack is possible if the application is configured to read GVariants over a network connection, this is not the default configuration which makes the likelihood low. Because the most widely available attack vector is local and the consequences are limited to denial of service, Red Hat Product Security rates the impact as Low.",
  "acknowledgement" : "Upstream acknowledges William Manley as the original reporter.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6631",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "glib2-0:2.68.4-11.el9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2528",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9::crb",
    "package" : "mingw-glib2-0:2.78.0-1.el9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6631",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "glib2-0:2.68.4-11.el9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "glib2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "glib2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "glib2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-29499\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-29499\nhttps://gitlab.gnome.org/GNOME/glib/-/issues/2794" ],
  "name" : "CVE-2023-29499",
  "csaw" : false
}