MGASA-2024-0311

Source
https://advisories.mageia.org/MGASA-2024-0311.html
Import Source
https://advisories.mageia.org/MGASA-2024-0311.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0311
Related
Published
2024-09-25T18:08:46Z
Modified
2024-09-25T17:39:38Z
Summary
Updated glib2.0 packages fix security vulnerability
Details

An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact. (CVE-2024-34397)

References
Credits

Affected packages

Mageia:9 / glib2.0

Package

Name
glib2.0
Purl
pkg:rpm/mageia/glib2.0?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.76.3-1.2.mga9

Ecosystem specific

{
    "section": "core"
}