glib2.0 vulnerability

Related Vulnerabilities: CVE-2009-3289  

Arand Nash discovered that applications linked to GLib (e.g. Nautilus) did not correctly copy symlinks. If a user copied symlinks with GLib, the symlink target files would become world-writable, allowing local attackers to gain access to potentially sensitive information.

The problem can be corrected by updating your system to the following package versions:

5 October 2009

glib2.0 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 9.04
  • Ubuntu 8.10
  • Ubuntu 8.04 LTS

Software Description

  • glib2.0

Details

Arand Nash discovered that applications linked to GLib (e.g. Nautilus) did not correctly copy symlinks. If a user copied symlinks with GLib, the symlink target files would become world-writable, allowing local attackers to gain access to potentially sensitive information.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 9.04
libglib2.0-0 - 2.20.1-0ubuntu2.1
Ubuntu 8.10
libglib2.0-0 - 2.18.2-0ubuntu2.2
Ubuntu 8.04 LTS
libglib2.0-0 - 2.16.6-0ubuntu1.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system upgrade you need to restart your session to effect the necessary changes.

References