SUSE-SU-2019:1596-1
Advisory lineage Upstream: 3 Downstream: 0
Published: 21 Jun 2019, 08:18
Last modified:04 Feb 2026, 03:51
Vulnerability Summary
Overall Risk (default)
minimal
0/100 CVSS Score
No data
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
21 Jun 2019, 08:18
Published
Vulnerability first disclosed
04 Feb 2026, 03:51
Last Modified
Vulnerability information updated
Description
Security update for glib2 This update for glib2 fixes the following issues: Security issues fixed: - CVE-2019-12450: Fixed an improper file permission when copy operation takes place (bsc#1137001). - CVE-2018-16428: Avoid a NULL pointer dereference (bsc#1107121). - CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116). - Some exploitable parser bugs in GVariant and GDBus subsystems were fixed (bsc#1111499).
Affected Systems
- suse•glib2&distro=SUSE Linux Enterprise Server 12 SP1-LTSS
< 2.38.2-7.9.2
- suse•glib2&distro=SUSE Linux Enterprise Server 12-LTSS
< 2.38.2-7.9.2
References (8)
- https://www.suse.com/support/update/announcement/2019/suse-su-20191596-1/
- https://bugzilla.suse.com/1107116
- https://bugzilla.suse.com/1107121
- https://bugzilla.suse.com/1111499
- https://bugzilla.suse.com/1137001
- https://www.suse.com/security/cve/CVE-2018-16428
- https://www.suse.com/security/cve/CVE-2018-16429
- https://www.suse.com/security/cve/CVE-2019-12450