glib2-2.56.4-166.el8_10
エラータID: AXSA:2025-10525:02
リリース日:
2025/07/18 Friday - 17:10
題名:
glib2-2.56.4-166.el8_10
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- GLib の GDBus には、意図せず他のユーザーになりすました D-Bus の
リクエストを送信してしまう問題があるため、ローカルの攻撃者により、
NetworkManager などの信頼できる GDBus ベースのサービスからの
リクエストの受信を介して、特定できない影響を与える攻撃を可能と
する脆弱性が存在します。(CVE-2024-34397)
- GLib の gio/gsocks4aproxy.c には、SOCKS4_CONN_MSG_LEN 定数が
文字列末尾の NULL 文字を考慮できていないことに起因するバッファー
オーバーフローの問題があるため、リモートの攻撃者により、情報の漏洩
や改竄、およびサービス拒否攻撃などを可能とする脆弱性が存在します。
(CVE-2024-52533)
- Glib2 の g_string_insert_unichar() 関数には、整数オーバーフロー
に起因してメモリ領域の読み取りが不足してしまう問題があるため、
リモートの攻撃者により、文字の挿入位置の細工を介して、データ破壊、
およびサービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2025-4373)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-34397
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
CVE-2024-52533
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
CVE-2025-4373
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
追加情報:
N/A
ダウンロード:
SRPMS
- glib2-2.56.4-166.el8_10.src.rpm
MD5: 7de795ae74f2a87ca2c21e3bd13441ad
SHA-256: 6a84ef38549ac1f952a5a92331b06531b74dab771d96ad5b07dfd3628ddb1396
Size: 6.83 MB
Asianux Server 8 for x86_64
- glib2-2.56.4-166.el8_10.i686.rpm
MD5: 0ae804ed57502384a13839749e54e9fa
SHA-256: 3a561eb30e0075d3fe8e92438497cccb625e8ce707738a74c97d30dfcccd51c4
Size: 2.59 MB - glib2-2.56.4-166.el8_10.x86_64.rpm
MD5: a7168216e60b4c06edb5536dda052497
SHA-256: 9e6355effd8cf9a11caae73fd3d0cb5d1b25ab239e51ba378ec4cf4a841cd5cd
Size: 2.49 MB - glib2-devel-2.56.4-166.el8_10.i686.rpm
MD5: b68a2688197c934bcf625731ab241cad
SHA-256: b0b5349f13df22e19f9b9e42aae87242fc8f84a27632c9d8987a86ead280f128
Size: 426.15 kB - glib2-devel-2.56.4-166.el8_10.x86_64.rpm
MD5: 6449f0801901e4c849aa5fb43cea3db9
SHA-256: 2d9b2c2966503428fcc767791add18d7320953780b48e6284e93c87c5a95f55b
Size: 424.55 kB - glib2-doc-2.56.4-166.el8_10.noarch.rpm
MD5: 792b6275aeae0db36cc04a187ce9f342
SHA-256: 923f79f6bdaeeab00a70eb580920ec3288938066558498e9b2970e3eb10f8fca
Size: 1.57 MB - glib2-fam-2.56.4-166.el8_10.x86_64.rpm
MD5: d8b84780c4db90ddb4664138ff23ba80
SHA-256: 50b9ab654cda28d29e550134519d896b100d63470a6d67b6814f365721a31107
Size: 12.57 kB - glib2-static-2.56.4-166.el8_10.i686.rpm
MD5: af6cbc8405c29f5b68327f00440bd432
SHA-256: 8f67bd09bcac2be86ae3736901e329bae3cc193989b103dce8496427753ce62b
Size: 1.68 MB - glib2-static-2.56.4-166.el8_10.x86_64.rpm
MD5: f16ff21677b9bb0dda0c947fe23bb44e
SHA-256: c25d293a02c556ba89c35b2e1a36d797f93ad9e7654e6da2b80b5663a30e2292
Size: 1.53 MB - glib2-tests-2.56.4-166.el8_10.x86_64.rpm
MD5: 30220250b4fd22053df2488bff9d5898
SHA-256: c3b2fac9c8770e5eee2a7d6f65d0cadabad74a23e457134ed1ea584e4e0e12de
Size: 1.76 MB