
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2023-32665) was discovered in GLib, affecting versions prior to 2.74.4. The flaw involves GVariant deserialization being vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service. The vulnerability was disclosed in May 2023 and has been assigned a CVSS v3.1 base score of 5.5 (Medium) (NVD, Red Hat).
The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data) and CWE-400 (Uncontrolled Resource Consumption). The CVSS vector string is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating that the vulnerability requires local access and user interaction, with no privileges required. The attack complexity is low, and while it doesn't impact confidentiality or integrity, it can have a high impact on availability (Ubuntu).
When successfully exploited, this vulnerability can lead to denial of service through excessive processing caused by the exponential blowup in GVariant deserialization. The impact is primarily on system availability, with no direct effect on confidentiality or integrity of the system (NVD, Gentoo).
The primary mitigation is to upgrade to GLib version 2.74.4 or later. Multiple Linux distributions have released security updates to address this vulnerability, including Red Hat, Debian, Ubuntu, and Gentoo. It's important to note that the original fix introduced new bugs resulting in CVE-2023-32643 and CVE-2023-32636 (Debian).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."