MGASA-2024-0312

Source
https://advisories.mageia.org/MGASA-2024-0312.html
Import Source
https://advisories.mageia.org/MGASA-2024-0312.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0312
Related
Published
2024-09-25T18:08:46Z
Modified
2024-09-25T17:42:54Z
Summary
Updated gtk+2.0 and gtk+3.0 packages fix security vulnerability
Details

A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current working directory. (CVE-2024-6655)

References
Credits

Affected packages

Mageia:9 / gtk+2.0

Package

Name
gtk+2.0
Purl
pkg:rpm/mageia/gtk+2.0?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
gtk+2.0-2.24.33-5.1.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / gtk+3.0

Package

Name
gtk+3.0
Purl
pkg:rpm/mageia/gtk+3.0?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
gtk+3.0-3.24.38-1.1.mga9

Ecosystem specific

{
    "section": "core"
}