Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in GLib (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in GLib (Aktualisierung)
ID: USN-3767-2
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 ESM
Datum: Mi, 19. September 2018, 14:55
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16428
Applikationen: GLib
Update von: Zwei Probleme in GLib

Originalnachricht


--===============8350211078343940648==
Content-Type: multipart/signed; micalg="pgp-sha256";
protocol="application/pgp-signature";
boundary="=-HFNi/fP+dn3YBi2dzI24"


--=-HFNi/fP+dn3YBi2dzI24
Content-Type: text/plain; charset="UTF-8
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3767-2
September 19, 2018

glib2.0 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in GLib.

Software Description:
- glib2.0: GLib Input, Output and Streaming Library (fam module)

Details:

USN-3767-1 fixed a vulnerability in GLib. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

It was discovered that GLib incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service
or execute arbitrary code. (CVE-2018-16428)

It was discovered that GLib incorrectly handled certain files.
An attacker could possibly use this issue to access sensitive
information. (CVE-2018-16429)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
libglib2.0-0 2.32.4-0ubuntu1.1
libglib2.0-bin 2.32.4-0ubuntu1.1
libglib2.0-dev 2.32.4-0ubuntu1.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3767-2
https://usn.ubuntu.com/usn/usn-3767-1
CVE-2018-16428, CVE-2018-16429
--=-HFNi/fP+dn3YBi2dzI24
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=e++6
-----END PGP SIGNATURE-----

--=-HFNi/fP+dn3YBi2dzI24--



--===============8350211078343940648==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============8350211078343940648==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung