Your submission was sent successfully! Close

USN-1753-1: DBus-GLib vulnerability

27 February 2013

An attacker could send crafted input to applications using DBus-GLib and possibly escalate privileges.

Releases

Packages

  • dbus-glib - simple interprocess messaging system

Details

Sebastian Krahmer and Bastien Nocera discovered that DBus-GLib did not
properly validate the message sender when the "NameOwnerChanged" signal was
received. A local attacker could possibly use this issue to escalate their
privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.10
Ubuntu 12.04
Ubuntu 11.10
Ubuntu 10.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

References