–===============8350211078343940648==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-HFNi/fP+dn3YBi2dzI24″
–=-HFNi/fP+dn3YBi2dzI24
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3767-2
September 19, 2018
glib2.0 vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in GLib.
Software Description:
– glib2.0: GLib Input, Output and Streaming Library (fam module)
Details:
USN-3767-1 fixed a vulnerability in GLib. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
=C2=A0It was discovered that GLib incorrectly handled certain files.
=C2=A0An attacker could possibly use this issue to cause a denial of servic=
e
=C2=A0or execute arbitrary code. (CVE-2018-16428)
=C2=A0It was discovered that GLib incorrectly handled certain files.
=C2=A0An attacker could possibly use this issue to access sensitive
=C2=A0information. (CVE-2018-16429)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
=C2=A0 libglib2.0-0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.32.4-0u=
buntu1.1
=C2=A0 libglib2.0-bin=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.32.4-0ubuntu1.1
=C2=A0 libglib2.0-dev=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.32.4-0ubuntu1.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3767-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3767-1
=C2=A0 CVE-2018-16428, CVE-2018-16429
–=-HFNi/fP+dn3YBi2dzI24
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=e++6
—–END PGP SIGNATURE—–
–=-HFNi/fP+dn3YBi2dzI24–
–===============8350211078343940648==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK
–===============8350211078343940648==–