USN-6165-2: GLib vulnerabilities
24206
04 December 2023
04 December 2023
CLOSED
MEDIUM
CVE-2023-29499,CVE-2023-32611,CVE-2023-32636,CVE-2023-32643,CVE-2023-32665
Severity
medium
Vendor
VMware Tanzu
Versions Affected
- Canonical Ubuntu 16.04
- Canonical Ubuntu 18.04
- Canonical Ubuntu 22.04
Description
USN-6165-1 fixed vulnerabilities in GLib. This update provides the corresponding updates for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: It was discovered that GLib incorrectly handled non-normal GVariants. An attacker could use this issue to cause GLib to crash, resulting in a denial of service, or perform other unknown attacks. Update Instructions: Run `sudo pro fix USN-6165-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libglib2.0-0 - 2.48.2-0ubuntu4.8+esm3 libglib2.0-0-refdbg - 2.48.2-0ubuntu4.8+esm3 libglib2.0-data - 2.48.2-0ubuntu4.8+esm3 libglib2.0-tests - 2.48.2-0ubuntu4.8+esm3 libglib2.0-doc - 2.48.2-0ubuntu4.8+esm3 libglib2.0-bin - 2.48.2-0ubuntu4.8+esm3 libglib2.0-dev - 2.48.2-0ubuntu4.8+esm3 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro
CVEs contained in this USN include: CVE-2023-29499, CVE-2023-32611, CVE-2023-32636, CVE-2023-32643, CVE-2023-32665
Affected VMware Products and Versions
Severity is medium unless otherwise noted.
- Platform Automation Toolkit
- 4.4.x versions prior to 4.4.32
- 5.0.x versions prior to 5.0.25
- 5.1.x versions prior to 5.1.2
- Isolation Segment
- 2.11.x versions prior to 2.11.42, or later versions with Xenial Stemcells prior to 621.730
- 2.13.x versions prior to 2.13.27, or later versions with Xenial Stemcells prior to 621.730
- 3.0.x versions prior to 3.0.20
- 4.0.x versions prior to 4.0.12+LTS-T
- Operations Manager
- 2.10.x versions prior to 2.10.65
- VMware Tanzu Application Service for VMs
- 2.11.x versions prior to 2.11.48, or later versions with Xenial Stemcells prior to 621.730
- 2.13.x versions prior to 2.13.30, or later versions with Xenial Stemcells prior to 621.730
- 3.0.x versions prior to 3.0.20
- 4.0.x versions prior to 4.0.12+LTS-T
Mitigation
Users of affected products are strongly encouraged to follow the mitigation below. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:- Platform Automation Toolkit
- 4.4.32
- 5.0.25
- 5.1.2
- Isolation Segment
- 2.11.42, and upgrade Xenial Stemcells to 621.730 or greater
- 2.13.27, and upgrade Xenial Stemcells to 621.730 or greater
- 3.0.20
- 4.0.12+LTS-T
- Operations Manager
- 2.10.65
- VMware Tanzu Application Service for VMs
- 2.11.48, and upgrade Xenial Stemcells to 621.730 or greater
- 2.13.30, and upgrade Xenial Stemcells to 621.730 or greater
- 3.0.20
- 4.0.12+LTS-T
References
- https://ubuntu.com/security/CVE-2023-29499
- https://ubuntu.com/security/CVE-2023-32611
- https://ubuntu.com/security/CVE-2023-32636
- https://ubuntu.com/security/CVE-2023-32643
- https://ubuntu.com/security/CVE-2023-32665
- https://ubuntu.com/security/notices/USN-6165-2
- https://cloudfoundry.org/blog/usn-6165-2
History
2023-12-04: Initial vulnerability report published.