SUSE: 2019:1596-1 important: glib2
Summary
This update for glib2 fixes the following issues: Security issues fixed: - CVE-2019-12450: Fixed an improper file permission when copy operation takes place (bsc#1137001). - CVE-2018-16428: Avoid a NULL pointer dereference (bsc#1107121). - CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116). - Some exploitable parser bugs in GVariant and GDBus subsystems were fixed (bsc#1111499). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-1596=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2019-1596=1 Package List: - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64): ...
Read the Full AdvisoryReferences
#1107116 #1107121 #1111499 #1137001
Cross- CVE-2018-16428 CVE-2018-16429 CVE-2019-12450
Affected Products:
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Linux Enterprise Server 12-LTSS
https://www.suse.com/security/cve/CVE-2018-16428.html
https://www.suse.com/security/cve/CVE-2018-16429.html
https://www.suse.com/security/cve/CVE-2019-12450.html
https://bugzilla.suse.com/1107116
https://bugzilla.suse.com/1107121
https://bugzilla.suse.com/1111499
https://bugzilla.suse.com/1137001