SUSE-SU-2018:3913-1
Advisory lineage Upstream: 2 Downstream: 0
Upstream
Published: 26 Nov 2018, 16:46
Last modified:04 Feb 2026, 03:18
Vulnerability Summary
Overall Risk (default)
minimal
0/100 CVSS Score
No data
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
26 Nov 2018, 16:46
Published
Vulnerability first disclosed
04 Feb 2026, 03:18
Last Modified
Vulnerability information updated
Description
Security update for glib2 This update for glib2 fixes the following issues: Security issues fixed: - CVE-2018-16428: Do not do a NULL pointer dereference (crash). Avoid that, at the cost of introducing a new translatable error message (bsc#1107121). - CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116). Non-security issue fixed: - various GVariant parsing issues have been resolved (bsc#1111499)
Affected Systems
- suse•glib2&distro=SUSE Linux Enterprise Module for Basesystem 15
< 2.54.3-4.7.1
- suse•glib2&distro=SUSE Linux Enterprise Module for Package Hub 15
< 2.54.3-4.7.1