{"id":31507,"date":"2019-06-11T20:38:55","date_gmt":"2019-06-11T11:38:55","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-4014-2-glib-vulnerability\/"},"modified":"2019-06-11T22:34:15","modified_gmt":"2019-06-11T13:34:15","slug":"usn-4014-2-glib-vulnerability","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-4014-2-glib-vulnerability\/","title":{"rendered":"USN-4014-2: GLib vulnerability"},"content":{"rendered":"<p>USN-4014-2: GLib vulnerability<\/p>\n<h2 id=\"glib2-0-vulnerability\">glib2.0 vulnerability<\/h2>\n<p>A security issue affects these releases of Ubuntu and its derivatives:<\/p>\n<ul>\n<li>Ubuntu 14.04 ESM<\/li>\n<li>Ubuntu 12.04 ESM<\/li>\n<\/ul>\n<h3 id=\"summary\">Summary<\/h3>\n<p>GLib could be made to expose sensitive information if it<br \/>\nreceived a specially crafted file.<\/p>\n<h3 id=\"software-description\">Software Description<\/h3>\n<ul>\n<li>glib2.0 &#8211; GLib Input, Output and Streaming Library (fam module)<\/li>\n<\/ul>\n<h3 id=\"details\">Details<\/h3>\n<p>USN-4014-1 fixed a vulnerability in GLib. This update provides<br \/>\nthe corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.<\/p>\n<p>Original advisory details:<\/p>\n<p>It was discovered that GLib incorrectly handled certain files.<br \/>\n An attacker could possibly use this issue to access sensitive information.<\/p>\n<h2 id=\"update-instructions\">Update instructions<\/h2>\n<p>The problem can be corrected by updating your system to the following package versions:<\/p>\n<dl>\n<dt>Ubuntu 14.04 ESM<\/dt>\n<dd>libglib2.0-0 &#8211; 2.40.2-0ubuntu1.1+esm1<\/dd>\n<dd>libglib2.0-bin &#8211; 2.40.2-0ubuntu1.1+esm1<\/dd>\n<dd>libglib2.0-dev &#8211; 2.40.2-0ubuntu1.1+esm1<\/dd>\n<dt>Ubuntu 12.04 ESM<\/dt>\n<dd>libglib2.0-0 &#8211; 2.32.4-0ubuntu1.2<\/dd>\n<dd>libglib2.0-bin &#8211; 2.32.4-0ubuntu1.2<\/dd>\n<dd>libglib2.0-dev &#8211; 2.32.4-0ubuntu1.2<\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions: <a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.<\/p>\n<p>In general, a standard system update will make all the necessary changes.<\/p>\n<h2 id=\"references\">References<\/h2>\n<ul>\n<li><a href=\"https:\/\/usn.ubuntu.com\/usn\/usn-4014-1\">USN-4014-1<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2019-12450\">CVE-2019-12450<\/a><\/li>\n<\/ul>\n<p>Source: <a href=\"https:\/\/usn.ubuntu.com\/4014-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">USN-4014-2: GLib vulnerability<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-4014-2: GLib vulnerability glib2.0 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 ESM Ubuntu 12.04 ESM Summary GLib could be made to expose sensitive information if it received a specially crafted file. Software Description glib2.0 &#8211; GLib Input, Output and Streaming Library (fam module) Details USN-4014-1 fixed a vulnerability in GLib. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that GLib incorrectly handled certain files. An attacker could possibly use this issue to access sensitive information. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM libglib2.0-0 &#8211; 2.40.2-0ubuntu1.1+esm1 libglib2.0-bin &#8211; 2.40.2-0ubuntu1.1+esm1 libglib2.0-dev &#8211; 2.40.2-0ubuntu1.1+esm1 Ubuntu 12.04 ESM libglib2.0-0 &#8211; 2.32.4-0ubuntu1.2 libglib2.0-bin &#8211; 2.32.4-0ubuntu1.2 libglib2.0-dev &#8211; 2.32.4-0ubuntu1.2 To update your system, please follow <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-4014-2-glib-vulnerability\/\" title=\"USN-4014-2: GLib vulnerability\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-31507","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/31507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=31507"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/31507\/revisions"}],"predecessor-version":[{"id":31508,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/31507\/revisions\/31508"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=31507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=31507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=31507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}