mingw-glib2-2.78.0-1.el9
エラータID: AXSA:2024-8071:01
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib: GVariant offset table entry size is not checked in is_normal() (CVE-2023-29499)
* glib: g_variant_byteswap() can take a long time with some non-normal inputs (CVE-2023-32611)
* glib: Timeout in fuzz_variant_text (CVE-2023-32636)
* glib: GVariant deserialisation does not match spec for non-normal data (CVE-2023-32665)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the MIRACLE LINUX 9.4 Release Notes linked from the References section.
CVE-2023-29499
A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.
CVE-2023-32611
A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.
CVE-2023-32636
A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.
CVE-2023-32665
A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.
Update packages.
A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.
A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.
A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.
A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.
N/A
SRPMS
- mingw-glib2-2.78.0-1.el9.src.rpm
MD5: 1f3649ff1612ca791cad3b1b3985924c
SHA-256: 0f2ea4f606ecf34871d45a58ea816bdc12322614cf98494d54df3ade8152dedc
Size: 5.10 MB
Asianux Server 9 for x86_64
- mingw32-glib2-2.78.0-1.el9.noarch.rpm
MD5: 5433a4de2eae545c0100234d41a806b3
SHA-256: 2e6571eb50a254481b366a2fe16a00e582ec2b999f0d3d806f4ff91a38cc6fbd
Size: 3.11 MB - mingw32-glib2-static-2.78.0-1.el9.noarch.rpm
MD5: 1136a2995a8f5212e626ac7830a2d516
SHA-256: 7cedda0da2045fdbf3005a86f64d3400e911421eb52f1b9b8579eb71d0924cd3
Size: 1.33 MB - mingw64-glib2-2.78.0-1.el9.noarch.rpm
MD5: 6e699ed099ad82372c68cff2b6bb540a
SHA-256: 6fe12f199db367949f0e1f77322c45e3c2c52776844457674c7659f44aabbdd1
Size: 3.07 MB - mingw64-glib2-static-2.78.0-1.el9.noarch.rpm
MD5: c7645834c51cda527df0728f421326ed
SHA-256: 91fd50b438b38416b1e1c019b6e4a6293995d13025cf6a5cf4c406c8c8a6e68a
Size: 1.32 MB