{
  "threat_severity" : "Low",
  "public_date" : "2022-12-14T00:00:00Z",
  "bugzilla" : {
    "description" : "glib: GVariant deserialisation does not match spec for non-normal data",
    "id" : "2211827",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2211827"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-400",
  "details" : [ "A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.", "A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service." ],
  "statement" : "This vulnerability allows for a denial of service attack to be performed against applications that process  untrusted GVariant input, compromising application availability by consuming excessive processing time or utilizing a large quantity of memory. The most likely threat is from a local user, which may be possible depending on the configuration of the service and the format of parameters that it expects. While a remote attack is possible if the application is configured to read GVariants over a network connection, this is not the default configuration which makes the likelihood low. Because the most widely available attack vector is local and the consequences are limited to denial of service, Red Hat Product Security rates the impact as Low.",
  "acknowledgement" : "Upstream acknowledges William Manley as the original reporter.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6631",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "glib2-0:2.68.4-11.el9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2528",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9::crb",
    "package" : "mingw-glib2-0:2.78.0-1.el9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6631",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "glib2-0:2.68.4-11.el9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "glib2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "glib2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "glib2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-32665\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-32665\nhttps://gitlab.gnome.org/GNOME/glib/-/issues/2121" ],
  "name" : "CVE-2023-32665",
  "csaw" : false
}