Lucene search

K
debianDebianDEBIAN:DSA-5682-1:ED5C1
HistoryMay 07, 2024 - 7:53 p.m.

[SECURITY] [DSA 5682-1] glib2.0 security update

2024-05-0719:53:30
lists.debian.org
16
glib2.0
spoofing
cve-2024-34397

AI Score

5.5

Confidence

Low

EPSS

0

Percentile

13.0%


Debian Security Advisory DSA-5682-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
May 07, 2024 https://www.debian.org/security/faq


Package : glib2.0
CVE ID : CVE-2024-34397

Alicia Boya Garcia reported that the GDBus signal subscriptions in the
GLib library are prone to a spoofing vulnerability. A local attacker can
take advantage of this flaw to cause a GDBus-based client to behave
incorrectly, with an application-dependent impact.

gnome-shell is updated along with this update to avoid a screencast
regression after fixing CVE-2024-34397.

For the oldstable distribution (bullseye), this problem has been fixed
in version 2.66.8-1+deb11u2.

For the stable distribution (bookworm), this problem has been fixed in
version 2.74.6-2+deb12u1.

We recommend that you upgrade your glib2.0 packages.

For the detailed security status of glib2.0 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/glib2.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]