Ubuntu 3767-1: GLib vulnerabilities

    Date19 Sep 2018
    Posted ByAnthony Pell
    Several security issues were fixed in GLib.
    Ubuntu Security Notice USN-3767-1
    September 19, 2018
    glib2.0 vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    - Ubuntu 14.04 LTS
    Several security issues were fixed in GLib.
    Software Description:
    - glib2.0: GLib Input, Output and Streaming Library (fam module)
    It was discovered that GLib incorrectly handled certain files.
    An attacker could possibly use this issue to cause a denial of service
    or execute arbitrary code. (CVE-2018-16428)
    It was discovered that GLib incorrectly handled certain files.
    An attacker could possibly use this issue to access sensitive
    information. (CVE-2018-16429)
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 18.04 LTS:
      libglib2.0-0                    2.56.2-0ubuntu0.18.04.2
      libglib2.0-bin                  2.56.2-0ubuntu0.18.04.2
      libglib2.0-dev                  2.56.2-0ubuntu0.18.04.2
    Ubuntu 16.04 LTS:
      libglib2.0-0                    2.48.2-0ubuntu4.1
      libglib2.0-bin                  2.48.2-0ubuntu4.1
      libglib2.0-dev                  2.48.2-0ubuntu4.1
    Ubuntu 14.04 LTS:
      libglib2.0-0                    2.40.2-0ubuntu1.1
      libglib2.0-bin                  2.40.2-0ubuntu1.1
      libglib2.0-dev                  2.40.2-0ubuntu1.1
    After a standard system update you need to reboot your computer to make
    all the necessary changes.
      CVE-2018-16428, CVE-2018-16429
    Package Information:
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":50,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.1,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"28","type":"x","order":"3","pct":35.9,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.