==========================================================================
Ubuntu Security Notice USN-3767-1
September 19, 2018
glib2.0 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in GLib.
Software Description:
– glib2.0: GLib Input, Output and Streaming Library (fam module)
Details:
It was discovered that GLib incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service
or execute arbitrary code. (CVE-2018-16428)
It was discovered that GLib incorrectly handled certain files.
An attacker could possibly use this issue to access sensitive
information. (CVE-2018-16429)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
libglib2.0-0 2.56.2-0ubuntu0.18.04.2
libglib2.0-bin 2.56.2-0ubuntu0.18.04.2
libglib2.0-dev 2.56.2-0ubuntu0.18.04.2
Ubuntu 16.04 LTS:
libglib2.0-0 2.48.2-0ubuntu4.1
libglib2.0-bin 2.48.2-0ubuntu4.1
libglib2.0-dev 2.48.2-0ubuntu4.1
Ubuntu 14.04 LTS:
libglib2.0-0 2.40.2-0ubuntu1.1
libglib2.0-bin 2.40.2-0ubuntu1.1
libglib2.0-dev 2.40.2-0ubuntu1.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3767-1
CVE-2018-16428, CVE-2018-16429
Package Information:
https://launchpad.net/ubuntu/+source/glib2.0/2.56.2-0ubuntu0.18.04.2
https://launchpad.net/ubuntu/+source/glib2.0/2.48.2-0ubuntu4.1
https://launchpad.net/ubuntu/+source/glib2.0/2.40.2-0ubuntu1.1—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=oY+a
—–END PGP SIGNATURE—–
—
==========================================================================
Ubuntu Security Notice USN-3767-2
September 19, 2018
glib2.0 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in GLib.
Software Description:
– glib2.0: GLib Input, Output and Streaming Library (fam module)
Details:
USN-3767-1 fixed a vulnerability in GLib. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that GLib incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service
or execute arbitrary code. (CVE-2018-16428)
It was discovered that GLib incorrectly handled certain files.
An attacker could possibly use this issue to access sensitive
information. (CVE-2018-16429)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
libglib2.0-0 2.32.4-0ubuntu1.1
libglib2.0-bin 2.32.4-0ubuntu1.1
libglib2.0-dev 2.32.4-0ubuntu1.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3767-2
https://usn.ubuntu.com/usn/usn-3767-1
CVE-2018-16428, CVE-2018-16429—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=e++6
—–END PGP SIGNATURE—–
—