CVE-2024-34397 Affecting mingw32-glib2-static package, versions <0:2.78.6-1.el9
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-MINGW32GLIB2STATIC-8383788
- published 18 Nov 2024
- disclosed 9 Sep 2024
Introduced: 9 Sep 2024
CVE-2024-34397 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
mingw32-glib2-static
to version 0:2.78.6-1.el9 or higher.
This issue was patched in ALSA-2024:9442
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream mingw32-glib2-static
package and not the mingw32-glib2-static
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
References
- https://errata.almalinux.org/9/ALSA-2024-6464.html
- https://access.redhat.com/security/cve/CVE-2024-34397
- https://access.redhat.com/errata/RHSA-2024:6464
- https://gitlab.gnome.org/GNOME/glib/-/issues/3268
- https://lists.debian.org/debian-lts-announce/2024/05/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/
- https://security.netapp.com/advisory/ntap-20240531-0008/
- https://www.openwall.com/lists/oss-security/2024/05/07/5