UbuntuUpdates.org

Package "glib2.0"

Name: glib2.0

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • GLib library of C routines - refdbg library
  • GLib library of C routines - installed tests

Latest version: 2.48.2-0ubuntu4.6
Release: xenial (16.04)
Level: updates
Repository: universe

Links



Other versions of "glib2.0" in Xenial

Repository Area Version
base main 2.48.0-1ubuntu4
base universe 2.48.0-1ubuntu4
security universe 2.48.2-0ubuntu4.6
security main 2.48.2-0ubuntu4.6
updates main 2.48.2-0ubuntu4.6

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.48.2-0ubuntu4.6 2020-03-24 09:06:31 UTC

  glib2.0 (2.48.2-0ubuntu4.6) xenial-security; urgency=medium

  * No-change rebuild for -security

 -- Alex Murray <email address hidden> Tue, 24 Mar 2020 11:28:34 +1030

Source diff to previous version

Version: 2.48.2-0ubuntu4.5 2020-03-24 01:07:23 UTC

  glib2.0 (2.48.2-0ubuntu4.5) xenial; urgency=medium

  * d/p/gcredentialsprivate-Document-the-various-private-macros.patch,
    d/p/credentials-Invalid-Linux-struct-ucred-means-no-informati.patch,
    d/p/GDBus-prefer-getsockopt-style-credentials-passing-APIs.patch:
    - Ensure libdbus clients can authenticate with a GDBusServer like
      the one in ibus. The patches cherry picked from 2.62.2-2 in focal
      in order to allow the ibus fix of CVE-2019-14822 to be re-enabled
      without breaking ibus for Qt applications (LP: #1844853).

 -- Gunnar Hjalmarsson <email address hidden> Thu, 31 Oct 2019 00:48:00 +0100

Source diff to previous version
1844853 IBus no longer works in Qt applications after upgrade
CVE-2019-14822 missing authorization flaw

Version: 2.48.2-0ubuntu4.4 2019-08-05 20:06:51 UTC

  glib2.0 (2.48.2-0ubuntu4.4) xenial-security; urgency=medium

  * SECURITY REGRESSION: regression in last security update (LP: #1838890)
    - debian/patches/CVE-2019-13012-regression.patch: fix a
      memory leak introduced by the last security update while
      not properly handled the g_file_get_patch function in
      gio/gkeyfilesettingsbackend.c.

 -- <email address hidden> (Leonidas S. Barbosa) Mon, 05 Aug 2019 12:09:36 -0300

Source diff to previous version
1838890 Suspected memory leak in xenial backport of fix for CVE-2019-13012
CVE-2019-13012 The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.59.1 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL,

Version: 2.48.2-0ubuntu4.3 2019-07-08 18:09:37 UTC

  glib2.0 (2.48.2-0ubuntu4.3) xenial-security; urgency=medium

  * SECURITY UPDATE: Not properly restrict directory and file permissions
    - debian/patches/CVE-2019-13012.patch: changes the permissions when
      a directory is created, using 700 instead 777 in
      gio/gkeyfilesettingsbackend.c and changes test to run in a temp
      directory in gio/tests/gsettings.c.
    - CVE-2019-13012

 -- <email address hidden> (Leonidas S. Barbosa) Wed, 03 Jul 2019 15:24:33 -0300

Source diff to previous version
CVE-2019-13012 The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.59.1 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL,

Version: 2.48.2-0ubuntu4.2 2019-06-10 21:06:59 UTC

  glib2.0 (2.48.2-0ubuntu4.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Less restrictive permissions during copying
    - debian/patches/CVE-2019-12450.patch: limit access to file when
      copying in file_copy_fallback in file gio/gfile.c.
    - CVE-2019-12450

 -- <email address hidden> (Leonidas S. Barbosa) Wed, 05 Jun 2019 13:49:53 -0300

CVE-2019-12450 file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progre



About   -   Send Feedback to @ubuntu_updates