glib2-2.56.4-166.el8_10
エラータID: AXSA:2025-10525:02
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib2: Signal subscription vulnerabilities (CVE-2024-34397)
* glib: buffer overflow in set_connect_msg() (CVE-2024-52533)
* glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-34397
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
CVE-2024-52533
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
CVE-2025-4373
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
Update packages.
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
N/A
SRPMS
- glib2-2.56.4-166.el8_10.src.rpm
MD5: 7de795ae74f2a87ca2c21e3bd13441ad
SHA-256: 6a84ef38549ac1f952a5a92331b06531b74dab771d96ad5b07dfd3628ddb1396
Size: 6.83 MB
Asianux Server 8 for x86_64
- glib2-2.56.4-166.el8_10.i686.rpm
MD5: 0ae804ed57502384a13839749e54e9fa
SHA-256: 3a561eb30e0075d3fe8e92438497cccb625e8ce707738a74c97d30dfcccd51c4
Size: 2.59 MB - glib2-2.56.4-166.el8_10.x86_64.rpm
MD5: a7168216e60b4c06edb5536dda052497
SHA-256: 9e6355effd8cf9a11caae73fd3d0cb5d1b25ab239e51ba378ec4cf4a841cd5cd
Size: 2.49 MB - glib2-devel-2.56.4-166.el8_10.i686.rpm
MD5: b68a2688197c934bcf625731ab241cad
SHA-256: b0b5349f13df22e19f9b9e42aae87242fc8f84a27632c9d8987a86ead280f128
Size: 426.15 kB - glib2-devel-2.56.4-166.el8_10.x86_64.rpm
MD5: 6449f0801901e4c849aa5fb43cea3db9
SHA-256: 2d9b2c2966503428fcc767791add18d7320953780b48e6284e93c87c5a95f55b
Size: 424.55 kB - glib2-doc-2.56.4-166.el8_10.noarch.rpm
MD5: 792b6275aeae0db36cc04a187ce9f342
SHA-256: 923f79f6bdaeeab00a70eb580920ec3288938066558498e9b2970e3eb10f8fca
Size: 1.57 MB - glib2-fam-2.56.4-166.el8_10.x86_64.rpm
MD5: d8b84780c4db90ddb4664138ff23ba80
SHA-256: 50b9ab654cda28d29e550134519d896b100d63470a6d67b6814f365721a31107
Size: 12.57 kB - glib2-static-2.56.4-166.el8_10.i686.rpm
MD5: af6cbc8405c29f5b68327f00440bd432
SHA-256: 8f67bd09bcac2be86ae3736901e329bae3cc193989b103dce8496427753ce62b
Size: 1.68 MB - glib2-static-2.56.4-166.el8_10.x86_64.rpm
MD5: f16ff21677b9bb0dda0c947fe23bb44e
SHA-256: c25d293a02c556ba89c35b2e1a36d797f93ad9e7654e6da2b80b5663a30e2292
Size: 1.53 MB - glib2-tests-2.56.4-166.el8_10.x86_64.rpm
MD5: 30220250b4fd22053df2488bff9d5898
SHA-256: c3b2fac9c8770e5eee2a7d6f65d0cadabad74a23e457134ed1ea584e4e0e12de
Size: 1.76 MB