File _patchinfo of Package patchinfo.42380

<patchinfo incident="42380">
  <issue tracker="cve" id="2026-0988"/>
  <issue tracker="bnc" id="1257049">VUL-0: CVE-2026-0988: glib2: integer overflow in `g_buffered_input_stream_peek()` can lead to segmentation fault and application crash</issue>
  <packager>mgorse</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for glib2</summary>
  <description>This update for glib2 fixes the following issues:

- CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354).
- CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355).
- CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353).
- CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).
</description>
</patchinfo>
openSUSE Build Service is sponsored by