First published: Thu May 09 2024(Updated: )
Alicia Boya García discovered that GLib incorrectly handled signal subscriptions. A local attacker could use this issue to spoof D-Bus signals resulting in a variety of impacts including possible privilege escalation.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libglib2.0-0t64 | <2.80.0-6ubuntu3.1 | 2.80.0-6ubuntu3.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/libglib2.0-bin | <2.80.0-6ubuntu3.1 | 2.80.0-6ubuntu3.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/libglib2.0-0 | <2.78.0-2ubuntu0.1 | 2.78.0-2ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/libglib2.0-bin | <2.78.0-2ubuntu0.1 | 2.78.0-2ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/libglib2.0-0 | <2.72.4-0ubuntu2.3 | 2.72.4-0ubuntu2.3 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libglib2.0-bin | <2.72.4-0ubuntu2.3 | 2.72.4-0ubuntu2.3 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libglib2.0-0 | <2.64.6-1~ubuntu20.04.7 | 2.64.6-1~ubuntu20.04.7 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libglib2.0-bin | <2.64.6-1~ubuntu20.04.7 | 2.64.6-1~ubuntu20.04.7 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6768-1 is classified as a potential privilege escalation vulnerability due to incorrect handling of signal subscriptions in GLib.
To fix USN-6768-1, update the affected packages to their remedied versions, which include libglib2.0-0t64, libglib2.0-bin, or other related packages from the appropriate Ubuntu versions.
USN-6768-1 affects Ubuntu 20.04, 22.04, 23.10, and 24.04 with specific versions of the libglib2.0 packages.
A local attacker can exploit USN-6768-1 to spoof D-Bus signals, which may lead to unauthorized actions or privilege escalation.
The vulnerability in USN-6768-1 was discovered by Alicia Boya García.