File _patchinfo of Package patchinfo.42479

<patchinfo incident="42479">
  <issue tracker="cve" id="2026-1485"/>
  <issue tracker="cve" id="2026-1489"/>
  <issue tracker="cve" id="2026-1484"/>
  <issue tracker="bnc" id="1257353">VUL-0: CVE-2026-1489: glib2: undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion</issue>
  <issue tracker="bnc" id="1257354">VUL-0: CVE-2026-1485: glib2: buffer underflow and out-of-bounds access due to integer wraparound in content type parsing</issue>
  <issue tracker="bnc" id="1257355">VUL-0: CVE-2026-1484: glib2: buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine</issue>
  <packager>mgorse</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for glib2</summary>
  <description>This update for glib2 fixes the following issues:

- CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354).
- CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355).
- CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353).
</description>
</patchinfo>
openSUSE Build Service is sponsored by