CVE-2024-34397 Affecting glib2.0 package, versions <2.80.0-10


low
0
10

Snyk CVSS

      Threat Intelligence

      EPSS 0.04% (9th percentile)
    Expand this section
    Red Hat
    3.8 low

    Do your applications use this vulnerable package?

    In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

    Test your applications
    • Snyk ID SNYK-DEBIANUNSTABLE-GLIB20-6811564
    • published 8 May 2024
    • disclosed 7 May 2024

    How to fix?

    Upgrade Debian:unstable glib2.0 to version 2.80.0-10 or higher.

    NVD Description

    Note: Versions mentioned in the description apply only to the upstream glib2.0 package and not the glib2.0 package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

    An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.