The upstream bug report describes this issue as follows:
A vulnerability was found in GLib2.0, where DoS caused by handling a malicious text-form variant which is structured to cause looping superlinear to its text size. Applications are at risk if they parse untrusted text-form variants.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | glib2 | 2023-04-27 16:19 | ALAS-2023-1742 |
Amazon Linux 2023 | glib2 | 2023-06-21 19:10 | ALAS2023-2023-225 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 6.2 | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |