Arbitrary Code Injection Affecting gtk3-devel-docs package, versions <0:3.24.31-5.el9
Threat Intelligence
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-GTK3DEVELDOCS-8383449
- published 18 Nov 2024
- disclosed 12 Nov 2024
Introduced: 12 Nov 2024
New CVE-2024-6655 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
gtk3-devel-docs
to version 0:3.24.31-5.el9 or higher.
This issue was patched in ALSA-2024:9184
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gtk3-devel-docs
package and not the gtk3-devel-docs
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current working directory.
References
- https://errata.almalinux.org/8/ALSA-2024-6963.html
- https://errata.almalinux.org/9/ALSA-2024-9184.html
- https://access.redhat.com/security/cve/CVE-2024-6655
- https://access.redhat.com/errata/RHSA-2024:6963
- https://access.redhat.com/errata/RHSA-2024:9184
- http://www.openwall.com/lists/oss-security/2024/09/09/1
- https://bugzilla.redhat.com/show_bug.cgi?id=2297098
- https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
CVSS Scores
version 3.1