Debian LTS: DLA-1866-1: glib2.0 security update
Summary
CVE-2018-16428
In GNOME GLib, g_markup_parse_context_end_parse() in gmarkup.c
had a NULL pointer dereference.
CVE-2018-16429
GNOME GLib had an out-of-bounds read vulnerability in
g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
CVE-2019-13012
The keyfile settings backend in GNOME GLib (aka glib2.0) before
created directories using g_file_make_directory_with_parents
(kfsb->dir, NULL, NULL) and files using g_file_replace_contents
(kfsb->file, contents, length, NULL, FALSE,
G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently,
it did not properly restrict directory (and file) permissions.
Instead, for directories, 0777 permissions were used; for files,
default file permissions were used. This issue is similar to
CVE-2019-12450.
For Debian 8 "Jessie", these problems have been fixed in version
2.42.1-1+deb8u2.
We recommend that you upgrade your glib2.0 packages.
Further information about Debian LTS security advisorie...
Package :glib2.0