[USN-3767-2] GLib vulnerabilities


–===============8350211078343940648==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-HFNi/fP+dn3YBi2dzI24″

–=-HFNi/fP+dn3YBi2dzI24
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3767-2
September 19, 2018

glib2.0 vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in GLib.

Software Description:
– glib2.0: GLib Input, Output and Streaming Library (fam module)

Details:

USN-3767-1 fixed a vulnerability in GLib. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0It was discovered that GLib incorrectly handled certain files.
=C2=A0An attacker could possibly use this issue to cause a denial of servic=
e
=C2=A0or execute arbitrary code. (CVE-2018-16428)

=C2=A0It was discovered that GLib incorrectly handled certain files.
=C2=A0An attacker could possibly use this issue to access sensitive
=C2=A0information. (CVE-2018-16429)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 libglib2.0-0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.32.4-0u=
buntu1.1
=C2=A0 libglib2.0-bin=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.32.4-0ubuntu1.1
=C2=A0 libglib2.0-dev=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.32.4-0ubuntu1.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3767-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3767-1
=C2=A0 CVE-2018-16428, CVE-2018-16429
–=-HFNi/fP+dn3YBi2dzI24
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=e++6
—–END PGP SIGNATURE—–

–=-HFNi/fP+dn3YBi2dzI24–

–===============8350211078343940648==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============8350211078343940648==–