File _patchinfo of Package patchinfo.9083
<patchinfo incident="9083">
<issue tracker="bnc" id="1137001">VUL-0: CVE-2019-12450: glib2: file_copy_fallback in gio/gfile.c does not properly restrict file permissions while a copy operation is in progress</issue>
<issue tracker="bnc" id="1111499">VUL-0: glib, glib2: GLib variant binary form and D-Bus message parsing problems</issue>
<issue tracker="bnc" id="1107121">VUL-1: CVE-2018-16428: glib,glib2: g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference</issue>
<issue id="1107116" tracker="bnc">VUL-1: CVE-2018-16429: glib,glib2: out-of-bounds read vulnerability ing_markup_parse_context_parse() in gmarkup.c, related to utf8_str()</issue>
<issue id="2018-16429" tracker="cve" />
<issue tracker="cve" id="2019-12450"/>
<issue tracker="cve" id="2018-16428"/>
<category>security</category>
<rating>important</rating>
<packager>qzhao</packager>
<description>This update for glib2 fixes the following issues:
Security issues fixed:
- CVE-2019-12450: Fixed an improper file permission when copy operation
takes place (bsc#1137001).
- CVE-2018-16428: Avoid a NULL pointer dereference (bsc#1107121).
- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).
- Some exploitable parser bugs in GVariant and GDBus subsystems were fixed (bsc#1111499).
</description>
<summary>Security update for glib2</summary>
</patchinfo>