Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:11327

Опубликовано: 29 июл. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: glib2 security update

GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.

Security Fix(es):

  • glib2: Signal subscription vulnerabilities (CVE-2024-34397)

  • glib: buffer overflow in set_connect_msg() (CVE-2024-52533)

  • glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
glib2x86_64166.el8_10glib2-2.56.4-166.el8_10.x86_64.rpm
glib2-develx86_64166.el8_10glib2-devel-2.56.4-166.el8_10.x86_64.rpm
glib2-famx86_64166.el8_10glib2-fam-2.56.4-166.el8_10.x86_64.rpm
glib2-testsx86_64166.el8_10glib2-tests-2.56.4-166.el8_10.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
27 дней назад

ELSA-2025-11327: glib2 security update (MODERATE)

oracle-oval
28 дней назад

ELSA-2025-11140: glib2 security update (MODERATE)

oracle-oval
27 дней назад

ELSA-2025-10855: glib2 security update (MODERATE)

CVSS3: 5.2
ubuntu
больше 1 года назад

An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.

CVSS3: 3.8
redhat
больше 1 года назад

An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.