USN-6768-1: GLib vulnerability
9 May 2024
GLib could be made to accept spoofed D-Bus signals.
Releases
Packages
- glib2.0 - GLib library of C routines
Details
Alicia Boya GarcĂa discovered that GLib incorrectly handled signal
subscriptions. A local attacker could use this issue to spoof D-Bus signals
resulting in a variety of impacts including possible privilege escalation.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.04
Ubuntu 23.10
Ubuntu 22.04
Ubuntu 20.04
After a standard system update you need to reboot your computer to make all
the necessary changes.