摘要:
glib2 security update
安全等级: Low
公告ID: KylinSec-SA-2024-4796
发布日期: 2025年2月17日
关联CVE: CVE-2024-34397
GLib is a bundle of three (formerly five) low-level system libraries written in C and developed mainly by GNOME. GLib's code was separated from GTK, so it can be used by software other than GNOME and has been developed in parallel ever since.
Security Fix(es):
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.(CVE-2024-34397)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-34397 | V6 | glib2 | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
glib2-help | noarch | 2.78.3-6.ks6 |
glib2 | x86_64 | 2.78.3-6.ks6 |
glib2-devel | x86_64 | 2.78.3-6.ks6 |
glib2-static | x86_64 | 2.78.3-6.ks6 |
glib2-tests | x86_64 | 2.78.3-6.ks6 |
glib2 | aarch64 | 2.78.3-6.ks6 |
glib2-devel | aarch64 | 2.78.3-6.ks6 |
glib2-static | aarch64 | 2.78.3-6.ks6 |
glib2-tests | aarch64 | 2.78.3-6.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名