File _patchinfo of Package patchinfo.42479
<patchinfo incident="42479"> <issue tracker="cve" id="2026-1485"/> <issue tracker="cve" id="2026-1489"/> <issue tracker="cve" id="2026-1484"/> <issue tracker="bnc" id="1257353">VUL-0: CVE-2026-1489: glib2: undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion</issue> <issue tracker="bnc" id="1257354">VUL-0: CVE-2026-1485: glib2: buffer underflow and out-of-bounds access due to integer wraparound in content type parsing</issue> <issue tracker="bnc" id="1257355">VUL-0: CVE-2026-1484: glib2: buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine</issue> <packager>mgorse</packager> <rating>important</rating> <category>security</category> <summary>Security update for glib2</summary> <description>This update for glib2 fixes the following issues: - CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354). - CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355). - CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353). </description> </patchinfo>