File _patchinfo of Package patchinfo
<patchinfo incident="9221"> <issue tracker="bnc" id="1111499">VUL-0: glib, glib2: GLib variant binary form and D-Bus message parsing problems</issue> <issue tracker="bnc" id="1107121">VUL-1: CVE-2018-16428: glib,glib2: g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference</issue> <issue id="1107116" tracker="bnc">VUL-1: CVE-2018-16429: glib,glib2: out-of-bounds read vulnerability ing_markup_parse_context_parse() in gmarkup.c, related to utf8_str()</issue> <issue id="2018-16429" tracker="cve" /> <issue tracker="cve" id="2018-16428"/> <category>security</category> <rating>moderate</rating> <packager>qzhao</packager> <description>This update for glib2 fixes the following issues: Security issues fixed: - CVE-2018-16428: Do not do a NULL pointer dereference (crash). Avoid that, at the cost of introducing a new translatable error message (bsc#1107121). - CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116). Non-security issue fixed: - various GVariant parsing issues have been resolved (bsc#1111499) This update was imported from the SUSE:SLE-15:Update update project.</description> <summary>Security update for glib2</summary> </patchinfo>