UbuntuUpdates.org

Package "libglib2.0-dev-bin"

Name: libglib2.0-dev-bin

Description:

Development utilities for the GLib library

Latest version: 2.64.6-1~ubuntu20.04.6
Release: focal (20.04)
Level: security
Repository: main
Head package: glib2.0
Homepage: http://www.gtk.org/

Links


Download "libglib2.0-dev-bin"


Other versions of "libglib2.0-dev-bin" in Focal

Repository Area Version
base main 2.64.2-1~fakesync1
updates main 2.64.6-1~ubuntu20.04.6

Changelog

Version: 2.64.6-1~ubuntu20.04.6 2023-06-14 15:07:09 UTC

  glib2.0 (2.64.6-1~ubuntu20.04.6) focal-security; urgency=medium

  * SECURITY UPDATE: multiple GVariant security issues
    - debian/patches/gvariant-security-*.patch: backported upstream fixes
      for GVariant normalization issues.
    - CVE-2023-24593, CVE-2023-29499, CVE-2023-25180, CVE-2023-32611,
      CVE-2023-32636, CVE-2023-32643, CVE-2023-32665

 -- Marc Deslauriers <email address hidden> Thu, 08 Jun 2023 10:20:31 -0400

Source diff to previous version
CVE-2023-29499 GVariant offset table entry size is not checked in is_normal()
CVE-2023-32611 g_variant_byteswap() can take a long time with some non-normal inputs
CVE-2023-32665 GVariant deserialisation does not match spec for non-normal data

Version: 2.64.6-1~ubuntu20.04.3 2021-03-15 19:06:25 UTC

  glib2.0 (2.64.6-1~ubuntu20.04.3) focal-security; urgency=medium

  * SECURITY UPDATE: incorrect g_file_replace() symlink handling
    - debian/patches/CVE-2021-28153-1.patch: fix a typo in a comment in
      gio/glocalfileoutputstream.c.
    - debian/patches/CVE-2021-28153-2.patch: stop using g_test_bug_base()
      in file tests in gio/tests/file.c.
    - debian/patches/CVE-2021-28153-3.patch: factor out a flag check in
      gio/glocalfileoutputstream.c.
    - debian/patches/CVE-2021-28153-4.patch: fix CREATE_REPLACE_DESTINATION
      with symlinks in gio/glocalfileoutputstream.c, gio/tests/file.c.
    - debian/patches/CVE-2021-28153-5.patch: add a missing O_CLOEXEC flag
      to replace() in gio/glocalfileoutputstream.c.
    - CVE-2021-28153

 -- Marc Deslauriers <email address hidden> Fri, 12 Mar 2021 11:38:38 -0500

Source diff to previous version
CVE-2021-28153 An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a

Version: 2.64.6-1~ubuntu20.04.2 2021-03-08 20:07:33 UTC

  glib2.0 (2.64.6-1~ubuntu20.04.2) focal-security; urgency=medium

  * SECURITY UPDATE: g_byte_array_new_take length truncation
    - debian/patches/CVE-2021-2721x/CVE-2021-27218.patch: do not accept too
      large byte arrays in glib/garray.c, glib/gbytes.c,
      glib/tests/bytes.c.
    - CVE-2021-27218
  * SECURITY UPDATE: integer overflow in g_bytes_new
    - debian/patches/CVE-2021-2721x/CVE-2021-27219*.patch: add internal
      g_memdup2() function and use it instead of g_memdup() in a bunch of
      places.
    - CVE-2021-27219

 -- Marc Deslauriers <email address hidden> Tue, 02 Mar 2021 12:28:09 -0500

CVE-2021-27218 An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a
CVE-2021-27219 An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms du



About   -   Send Feedback to @ubuntu_updates