Thursday, May 9, 2024

[USN-6768-1] GLib vulnerability

-----BEGIN PGP SIGNATURE-----
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=IUWy
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6768-1
May 09, 2024

glib2.0 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

GLib could be made to accept spoofed D-Bus signals.

Software Description:
- glib2.0: GLib library of C routines

Details:

Alicia Boya García discovered that GLib incorrectly handled signal
subscriptions. A local attacker could use this issue to spoof D-Bus signals
resulting in a variety of impacts including possible privilege escalation.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
libglib2.0-0t64 2.80.0-6ubuntu3.1
libglib2.0-bin 2.80.0-6ubuntu3.1

Ubuntu 23.10
libglib2.0-0 2.78.0-2ubuntu0.1
libglib2.0-bin 2.78.0-2ubuntu0.1

Ubuntu 22.04 LTS
libglib2.0-0 2.72.4-0ubuntu2.3
libglib2.0-bin 2.72.4-0ubuntu2.3

Ubuntu 20.04 LTS
libglib2.0-0 2.64.6-1~ubuntu20.04.7
libglib2.0-bin 2.64.6-1~ubuntu20.04.7

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6768-1
CVE-2024-34397

Package Information:
https://launchpad.net/ubuntu/+source/glib2.0/2.80.0-6ubuntu3.1
https://launchpad.net/ubuntu/+source/glib2.0/2.78.0-2ubuntu0.1
https://launchpad.net/ubuntu/+source/glib2.0/2.72.4-0ubuntu2.3
https://launchpad.net/ubuntu/+source/glib2.0/2.64.6-1~ubuntu20.04.7

No comments:

Post a Comment