Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6655: Improper Control of Generation of Code ('Code Injection')

0
High
VulnerabilityCVE-2024-6655cvecve-2024-6655
Published: Tue Jul 16 2024 (07/16/2024, 15:05:55 UTC)
Source: CVE Database V5

Description

A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current working directory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:49:26 UTC

Technical Analysis

CVE-2024-6655 is a vulnerability identified in the GTK library, a widely used toolkit for creating graphical user interfaces primarily on Linux and Unix-like systems. The flaw involves improper control over the generation of code, specifically allowing a malicious library to be injected into a GTK application from the current working directory under certain conditions. This means that if an attacker can place a crafted malicious shared library in the directory from which a GTK application is launched, the application may load and execute this malicious code. The vulnerability has a CVSS v3.1 score of 7.0, indicating high severity, with the vector AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H. This translates to a local attack vector requiring high attack complexity, no privileges, but user interaction is necessary. The scope remains unchanged, but the impact on confidentiality, integrity, and availability is high, meaning an attacker can fully compromise the affected application. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. The vulnerability was reserved and published in July 2024, with Red Hat as the assigner. The root cause is the GTK library's failure to properly restrict loading of libraries from untrusted directories, allowing code injection via malicious shared objects in the current working directory. This can lead to arbitrary code execution within the context of the GTK application, potentially escalating to full system compromise depending on the application's privileges.

Potential Impact

The impact of CVE-2024-6655 is significant for organizations using GTK-based applications, especially on Linux desktops, embedded systems, and devices relying on GTK for their graphical interface. An attacker with local access who can trick a user into launching a GTK application from a directory containing a malicious library can execute arbitrary code with the privileges of the user running the application. This can lead to data theft, unauthorized system modifications, installation of persistent malware, or denial of service. Since many Linux distributions and embedded devices use GTK, the scope is broad. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in environments where users may be tricked into opening applications from untrusted directories, such as shared workstations, developer environments, or via social engineering. The high impact on confidentiality, integrity, and availability means that sensitive data and system stability can be severely affected. Organizations relying on GTK applications for critical operations may face operational disruptions and data breaches if exploited.

Mitigation Recommendations

To mitigate CVE-2024-6655, organizations should implement the following specific measures: 1) Monitor and restrict the directories from which GTK applications are launched, ensuring they do not include untrusted or user-writable locations such as shared or temporary directories. 2) Educate users to avoid launching GTK applications from untrusted directories or locations where malicious libraries could be placed. 3) Employ application whitelisting and integrity verification to detect and prevent loading of unauthorized libraries. 4) Use Linux security modules such as SELinux or AppArmor to restrict GTK applications' ability to load libraries from arbitrary paths. 5) Regularly update GTK libraries and monitor vendor advisories for patches addressing this vulnerability; apply patches promptly once available. 6) In development and deployment environments, enforce strict build and execution policies to prevent inadvertent exposure to malicious libraries. 7) Consider containerization or sandboxing GTK applications to limit the impact of potential code injection. These targeted mitigations go beyond generic advice by focusing on controlling the execution context and library loading behavior specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-07-10T13:48:56.542Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683c4454182aa0cae211861e

Added to database: 6/1/2025, 12:15:16 PM

Last enriched: 2/28/2026, 3:49:26 AM

Last updated: 3/25/2026, 1:39:11 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses