USN-1753-1: DBus-GLib vulnerability

Publication date

27 February 2013

Overview

An attacker could send crafted input to applications using DBus-GLib and possibly escalate privileges.


Packages

  • dbus-glib - simple interprocess messaging system

Details

Sebastian Krahmer and Bastien Nocera discovered that DBus-GLib did not
properly validate the message sender when the “NameOwnerChanged” signal was
received. A local attacker could possibly use this issue to escalate their
privileges.

Sebastian Krahmer and Bastien Nocera discovered that DBus-GLib did not
properly validate the message sender when the “NameOwnerChanged” signal was
received. A local attacker could possibly use this issue to escalate their
privileges.

Update instructions

After a standard system update you need to reboot your computer to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
12.10 quantal libdbus-glib-1-2 –  0.100-1ubuntu0.1
12.04 precise libdbus-glib-1-2 –  0.98-1ubuntu1.1
11.10 oneiric libdbus-glib-1-2 –  0.94-4ubuntu0.1
10.04 lucid libdbus-glib-1-2 –  0.84-1ubuntu0.3

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›