Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-r5t7-nkkv-skhg
Vulnerability ID VCID-r5t7-nkkv-skhg
Aliases CVE-2024-34397
Summary A vulnerability has been discovered in GLib, which can lead to privilege escalation.
Status Published
Exploitability 0.5
Weighted Severity 4.7
Risk 2.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 3.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34397.json
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-34397
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-34397
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-34397
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-34397
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-34397
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-34397
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2024-34397
cvssv3.1 3.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.2 https://gitlab.gnome.org/GNOME/glib/-/issues/3268
ssvc Track https://gitlab.gnome.org/GNOME/glib/-/issues/3268
cvssv3.1 5.2 https://lists.debian.org/debian-lts-announce/2024/05/msg00008.html
ssvc Track https://lists.debian.org/debian-lts-announce/2024/05/msg00008.html
cvssv3.1 5.2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/
cvssv3.1 5.2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/
cvssv3.1 5.2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/
cvssv3.1 5.2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/
cvssv3.1 5.2 https://security.netapp.com/advisory/ntap-20240531-0008/
ssvc Track https://security.netapp.com/advisory/ntap-20240531-0008/
cvssv3.1 5.2 https://www.openwall.com/lists/oss-security/2024/05/07/5
ssvc Track https://www.openwall.com/lists/oss-security/2024/05/07/5
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34397.json
https://api.first.org/data/v1/epss?cve=CVE-2024-34397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34397
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2279632 https://bugzilla.redhat.com/show_bug.cgi?id=2279632
3268 https://gitlab.gnome.org/GNOME/glib/-/issues/3268
5 https://www.openwall.com/lists/oss-security/2024/05/07/5
GLSA-202406-01 https://security.gentoo.org/glsa/202406-01
IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/
LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/
LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/
msg00008.html https://lists.debian.org/debian-lts-announce/2024/05/msg00008.html
ntap-20240531-0008 https://security.netapp.com/advisory/ntap-20240531-0008/
RHSA-2024:10135 https://access.redhat.com/errata/RHSA-2024:10135
RHSA-2024:11109 https://access.redhat.com/errata/RHSA-2024:11109
RHSA-2024:6464 https://access.redhat.com/errata/RHSA-2024:6464
RHSA-2024:7213 https://access.redhat.com/errata/RHSA-2024:7213
RHSA-2024:7374 https://access.redhat.com/errata/RHSA-2024:7374
RHSA-2024:9442 https://access.redhat.com/errata/RHSA-2024:9442
RHSA-2025:10780 https://access.redhat.com/errata/RHSA-2025:10780
RHSA-2025:11327 https://access.redhat.com/errata/RHSA-2025:11327
RHSA-2025:11662 https://access.redhat.com/errata/RHSA-2025:11662
RHSA-2025:14988 https://access.redhat.com/errata/RHSA-2025:14988
RHSA-2025:14989 https://access.redhat.com/errata/RHSA-2025:14989
RHSA-2025:14990 https://access.redhat.com/errata/RHSA-2025:14990
RHSA-2025:14991 https://access.redhat.com/errata/RHSA-2025:14991
UNFJHISR4O6VFOHBFWH5I5WWMG37H63A https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/
USN-6768-1 https://usn.ubuntu.com/6768-1/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34397.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L Found at https://gitlab.gnome.org/GNOME/glib/-/issues/3268
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/ Found at https://gitlab.gnome.org/GNOME/glib/-/issues/3268
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L Found at https://lists.debian.org/debian-lts-announce/2024/05/msg00008.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/ Found at https://lists.debian.org/debian-lts-announce/2024/05/msg00008.html
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L Found at https://security.netapp.com/advisory/ntap-20240531-0008/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/ Found at https://security.netapp.com/advisory/ntap-20240531-0008/
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L Found at https://www.openwall.com/lists/oss-security/2024/05/07/5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/ Found at https://www.openwall.com/lists/oss-security/2024/05/07/5
Exploit Prediction Scoring System (EPSS)
Percentile 0.40881
EPSS Score 0.0019
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:02:44.784230+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/202406-01 38.0.0