Login
Newsletter
Werbung

Sicherheit: Mangelnde Rechteprüfung in GLib
Aktuelle Meldungen Distributionen
Name: Mangelnde Rechteprüfung in GLib
ID: USN-6768-1
Distribution: Ubuntu
Plattformen: Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10, Ubuntu 24.04 LTS
Datum: Fr, 10. Mai 2024, 00:08
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34397
Applikationen: GLib

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8589539056983909804==
Content-Language: en-CA
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------VjE5HWliw0MLhY0DI3EYL9cx"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------VjE5HWliw0MLhY0DI3EYL9cx
Content-Type: multipart/mixed;
boundary="------------VSCecl7Azb62BZj2e40qDSDw";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <836ea151-ef95-4bca-a8f4-373cfd8c1a35@canonical.com>
Subject: [USN-6768-1] GLib vulnerability

--------------VSCecl7Azb62BZj2e40qDSDw
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-6768-1
May 09, 2024

glib2.0 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

GLib could be made to accept spoofed D-Bus signals.

Software Description:
- glib2.0: GLib library of C routines

Details:

Alicia Boya García discovered that GLib incorrectly handled signal
subscriptions. A local attacker could use this issue to spoof D-Bus signals
resulting in a variety of impacts including possible privilege escalation.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
libglib2.0-0t64 2.80.0-6ubuntu3.1
libglib2.0-bin 2.80.0-6ubuntu3.1

Ubuntu 23.10
libglib2.0-0 2.78.0-2ubuntu0.1
libglib2.0-bin 2.78.0-2ubuntu0.1

Ubuntu 22.04 LTS
libglib2.0-0 2.72.4-0ubuntu2.3
libglib2.0-bin 2.72.4-0ubuntu2.3

Ubuntu 20.04 LTS
libglib2.0-0 2.64.6-1~ubuntu20.04.7
libglib2.0-bin 2.64.6-1~ubuntu20.04.7

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6768-1
CVE-2024-34397

Package Information:
https://launchpad.net/ubuntu/+source/glib2.0/2.80.0-6ubuntu3.1
https://launchpad.net/ubuntu/+source/glib2.0/2.78.0-2ubuntu0.1
https://launchpad.net/ubuntu/+source/glib2.0/2.72.4-0ubuntu2.3
https://launchpad.net/ubuntu/+source/glib2.0/2.64.6-1~ubuntu20.04.7

--------------VSCecl7Azb62BZj2e40qDSDw--

--------------VjE5HWliw0MLhY0DI3EYL9cx
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----
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=IUWy
-----END PGP SIGNATURE-----

--------------VjE5HWliw0MLhY0DI3EYL9cx--


--===============8589539056983909804==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============8589539056983909804==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung