USN-4764-1: GLib vulnerability

Publication date

15 March 2021

Overview

GLib could be made to create files if it opened a specially crafted archive.


Packages

  • glib2.0 - GLib library of C routines

Details

It was discovered that GLib incorrectly handled certain symlinks when
replacing files. If a user or automated system were tricked into extracting
a specially crafted file with File Roller, a remote attacker could possibly
create files outside of the intended directory.

It was discovered that GLib incorrectly handled certain symlinks when
replacing files. If a user or automated system were tricked into extracting
a specially crafted file with File Roller, a remote attacker could possibly
create files outside of the intended directory.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
20.10 groovy libglib2.0-0 –  2.66.1-2ubuntu0.2
20.04 focal libglib2.0-0 –  2.64.6-1~ubuntu20.04.3
18.04 bionic libglib2.0-0 –  2.56.4-0ubuntu0.18.04.8
16.04 xenial libglib2.0-0 –  2.48.2-0ubuntu4.8

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›