==========================================================================
Ubuntu Security Notice USN-4014-1
June 10, 2019
glib2.0 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 19.04
– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
Summary:
GLib could be made to expose sensitive information if it
received a specially crafted file.
Software Description:
– glib2.0: GLib library of C routines
Details:
It was discovered that GLib incorrectly handled certain files.
An attacker could possibly use this issue to access sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
libglib2.0-0 2.60.0-1ubuntu0.1
libglib2.0-bin 2.60.0-1ubuntu0.1
libglib2.0-dev 2.60.0-1ubuntu0.1
Ubuntu 18.10:
libglib2.0-0 2.58.1-2ubuntu0.1
libglib2.0-bin 2.58.1-2ubuntu0.1
libglib2.0-dev 2.58.1-2ubuntu0.1
Ubuntu 18.04 LTS:
libglib2.0-0 2.56.4-0ubuntu0.18.04.3
libglib2.0-bin 2.56.4-0ubuntu0.18.04.3
libglib2.0-dev 2.56.4-0ubuntu0.18.04.3
Ubuntu 16.04 LTS:
libglib2.0-0 2.48.2-0ubuntu4.2
libglib2.0-bin 2.48.2-0ubuntu4.2
libglib2.0-dev 2.48.2-0ubuntu4.2
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4014-1
CVE-2019-12450
Package Information:
https://launchpad.net/ubuntu/+source/glib2.0/2.60.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/glib2.0/2.58.1-2ubuntu0.1
https://launchpad.net/ubuntu/+source/glib2.0/2.56.4-0ubuntu0.18.04.3
https://launchpad.net/ubuntu/+source/glib2.0/2.48.2-0ubuntu4.2
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=qRCc
—–END PGP SIGNATURE—–
—
========================================================================== Ubuntu Security Notice USN-4014-2 June 11, 2019 glib2.0 vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM - Ubuntu 12.04 ESM Summary: GLib could be made to expose sensitive information if it received a specially crafted file. Software Description: - glib2.0: GLib Input, Output and Streaming Library (fam module) Details: USN-4014-1 fixed a vulnerability in GLib. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that GLib incorrectly handled certain files. An attacker could possibly use this issue to access sensitive information. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: libglib2.0-0 2.40.2-0ubuntu1.1+esm1 libglib2.0-bin 2.40.2-0ubuntu1.1+esm1 libglib2.0-dev 2.40.2-0ubuntu1.1+esm1 Ubuntu 12.04 ESM: libglib2.0-0 2.32.4-0ubuntu1.2 libglib2.0-bin 2.32.4-0ubuntu1.2 libglib2.0-dev 2.32.4-0ubuntu1.2 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4014-2 https://usn.ubuntu.com/4014-1 CVE-2019-12450 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJc/5/sAAoJEEW851uECx9p6CAQAIngykQk42XQ1v142KxGUZ0a mkxelSmOk8HfNDhmEA93AW/55zFnheTPKi/9AJxzrDY9XLHl86tE0WgYUT4mdFfj qf6OwavNJlvpwT94cIXSMA2xVBvotof1Wji+FlQuGQUj7CjQblOcQFiF6myHyoJP 47rx6/+f9nGxZh0sIzikN6xZ9NkQLhyQmISOJQOcKM+ENL65Uf4DVoJ2iSYbmUKb lG64q8/oMV5zdarx883VVjsiGAJnQ3RU+G+Wk9XhD5USiSxGrvuf82iF5DVyN7eN nOQicHUyK0/ctUMG7mpVQqn/Ndn+DICbHIq694TP64ZB1h26HCSgfqayrjv0UN9A RLdjxSSNSiQJhiEATQzO8mhPCgXmS3nu52DgjOxz1mX7Sa6Z8IyGF++vXB5LruL2 McBMaYBL98tATUN0myEzdmM507yM9jE8uNaogCMnsl4l0HvE97u30uk96wZ1Fo6T 6xg7lCW5MWmNZ15Q6fGNkoO279EadekpTrheFxJj+39qQUrgufXAIZtaKzIM/+LA w63jJzVPg88kKkXRoB0e76ey9Q+Zu+JcPPj7FXM2KCyUiuFcoMRTllpP3hf1hf5H Ve/+Hq1VSBSgGCEaToP0xB9PtZ0XDGk0Eg7EzUIgW2B86oUKGixpN3MB99cpQqw9 ySLr+KD8XeCcrDRmZ8u7 =wuKf -----END PGP SIGNATURE----- -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce$downloadlink = get_field('download_link'); ?>