File _patchinfo of Package patchinfo.9135

<patchinfo incident="9135">
  <issue tracker="bnc" id="1111499">VUL-0: glib, glib2: GLib variant binary form and D-Bus message parsing problems</issue>
 <issue tracker="bnc" id="1107121">VUL-1: CVE-2018-16428: glib,glib2: g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference</issue>
  <issue id="1107116" tracker="bnc">VUL-1: CVE-2018-16429: glib,glib2: out-of-bounds read vulnerability ing_markup_parse_context_parse() in gmarkup.c, related to utf8_str()</issue>          
  <issue id="2018-16429" tracker="cve" />
  <issue tracker="cve" id="2018-16428"/>
  <category>security</category>
  <rating>moderate</rating>
  <packager>qzhao</packager>
  <description>This update for glib2 fixes the following issues:

Security issues fixed:

- CVE-2018-16428: Do not do a NULL pointer dereference (crash).
  Avoid that, at the cost of introducing a new translatable error
  message (bsc#1107121).
- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).

Non-security issue fixed:

- various GVariant parsing issues have been resolved (bsc#1111499)
</description>
  <summary>Security update for glib2</summary>
</patchinfo>
openSUSE Build Service is sponsored by