glib2 安全漏洞 (CVE-2024-34397)

CVE编号

CVE-2024-34397

利用情况

暂无

补丁情况

N/A

披露时间

2024-05-08
漏洞描述
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 alpine_3.19 glib * Up to
(excluding)
2.78.5-r0
运行在以下环境
系统 debian_11 glib2.0 * Up to
(excluding)
2.66.8-1+deb11u2
运行在以下环境
系统 debian_12 glib2.0 * Up to
(excluding)
2.74.6-2+deb12u1
运行在以下环境
系统 fedora_39 glib2 * Up to
(excluding)
2.78.5-1.fc39
运行在以下环境
系统 fedora_40 glib2 * Up to
(excluding)
2.80.1-1.fc40
运行在以下环境
系统 ubuntu_20.04 glib2.0 * Up to
(excluding)
2.64.6-1~ubuntu20.04.7
运行在以下环境
系统 ubuntu_22.04 glib2.0 * Up to
(excluding)
2.72.4-0ubuntu2.3
CVSS3评分
N/A
  • 攻击路径
    N/A
  • 攻击复杂度
    N/A
  • 权限要求
    N/A
  • 影响范围
    N/A
  • 用户交互
    N/A
  • 可用性
    N/A
  • 保密性
    N/A
  • 完整性
    N/A
CWE-ID 漏洞类型
阿里云安全产品覆盖情况