USN-1753-1: DBus-GLib vulnerability
27 February 2013
An attacker could send crafted input to applications using DBus-GLib and possibly escalate privileges.
- dbus-glib - simple interprocess messaging system
Sebastian Krahmer and Bastien Nocera discovered that DBus-GLib did not
properly validate the message sender when the "NameOwnerChanged" signal was
received. A local attacker could possibly use this issue to escalate their
The problem can be corrected by updating your system to the following package versions:
After a standard system update you need to reboot your computer to make
all the necessary changes.