UbuntuUpdates.org

Package "glib2.0"

Name: glib2.0

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • GLib library of C routines - refdbg library
  • GLib library of C routines - installed tests

Latest version: 2.48.2-0ubuntu4.4
Release: xenial (16.04)
Level: updates
Repository: universe

Links

Save this URL for the latest version of "glib2.0": https://www.ubuntuupdates.org/glib2.0



Other versions of "glib2.0" in Xenial

Repository Area Version
base main 2.48.0-1ubuntu4
base universe 2.48.0-1ubuntu4
security main 2.48.2-0ubuntu4.4
security universe 2.48.2-0ubuntu4.4
updates main 2.48.2-0ubuntu4.4

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.48.2-0ubuntu4.4 2019-08-05 20:06:51 UTC

  glib2.0 (2.48.2-0ubuntu4.4) xenial-security; urgency=medium

  * SECURITY REGRESSION: regression in last security update (LP: #1838890)
    - debian/patches/CVE-2019-13012-regression.patch: fix a
      memory leak introduced by the last security update while
      not properly handled the g_file_get_patch function in
      gio/gkeyfilesettingsbackend.c.

 -- <email address hidden> (Leonidas S. Barbosa) Mon, 05 Aug 2019 12:09:36 -0300

Source diff to previous version
1838890 Suspected memory leak in xenial backport of fix for CVE-2019-13012
CVE-2019-13012 The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.59.1 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL,

Version: 2.48.2-0ubuntu4.3 2019-07-08 18:09:37 UTC

  glib2.0 (2.48.2-0ubuntu4.3) xenial-security; urgency=medium

  * SECURITY UPDATE: Not properly restrict directory and file permissions
    - debian/patches/CVE-2019-13012.patch: changes the permissions when
      a directory is created, using 700 instead 777 in
      gio/gkeyfilesettingsbackend.c and changes test to run in a temp
      directory in gio/tests/gsettings.c.
    - CVE-2019-13012

 -- <email address hidden> (Leonidas S. Barbosa) Wed, 03 Jul 2019 15:24:33 -0300

Source diff to previous version
CVE-2019-13012 The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.59.1 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL,

Version: 2.48.2-0ubuntu4.2 2019-06-10 21:06:59 UTC

  glib2.0 (2.48.2-0ubuntu4.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Less restrictive permissions during copying
    - debian/patches/CVE-2019-12450.patch: limit access to file when
      copying in file_copy_fallback in file gio/gfile.c.
    - CVE-2019-12450

 -- <email address hidden> (Leonidas S. Barbosa) Wed, 05 Jun 2019 13:49:53 -0300

Source diff to previous version
CVE-2019-12450 file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progre

Version: 2.48.2-0ubuntu4.1 2018-09-19 09:06:27 UTC

  glib2.0 (2.48.2-0ubuntu4.1) xenial-security; urgency=medium

  * SECURITY UPDATE: NULL pointer deference
    - debian/patches/CVE-2018-16428.patch: fix in glib/gmarkup.c,
      glib/tests/Makefile.am,
      glib/tests/markups/fail-51.expected,
      glib/tests/markups/fail-51.gmarkup.
    - CVE-2018-16428
  * SECURITY UPDATE: Read out-of-bounds
    - debian/patches/CVE-2018-16429.patch: fix in glib/gmarkup.c and
      glib/tests/Makefile.am,
      glib/tests/markups/fail-50.expected,
      glib/tests/markups/fail-50.gmarkup.
    - CVE-2018-16429

 -- <email address hidden> (Leonidas S. Barbosa) Mon, 17 Sep 2018 10:58:18 -0300

Source diff to previous version
CVE-2018-16428 In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.
CVE-2018-16429 GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().

Version: 2.48.2-0ubuntu4 2018-08-02 16:07:19 UTC

  glib2.0 (2.48.2-0ubuntu4) xenial; urgency=medium

  * Add a versioned Pre-Depends for dpkg because the libglib2.0-0 -await
    trigger requires a newer dpkg than the one in Ubuntu 14.04. (LP: #1784065)

 -- Brian Murray <email address hidden> Mon, 30 Jul 2018 08:29:26 -0700

1784065 upgrade from 14.04 to 16.04 fails due to `interest-await' in trigger



About   -   Send Feedback to @ubuntu_updates