[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2019:1596-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":20,"duplicates":21,"related":22,"reserved_at":9,"published_at":26,"modified_at":27,"state":9,"summary":28,"references_raw":30,"kevs":67,"epss":9,"epss_history":68,"metrics":69,"affected":70},"SUSE-SU-2019:1596-1","Security update for glib2\n\nThis update for glib2 fixes the following issues:\n\nSecurity issues fixed:    \n\n- CVE-2019-12450: Fixed an improper file permission when copy operation\n  takes place (bsc#1137001).     \n- CVE-2018-16428: Avoid a NULL pointer dereference (bsc#1107121).\n- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).\n- Some exploitable parser bugs in GVariant and GDBus subsystems were fixed (bsc#1111499).\n\n",null,[],[],[],[14,16,18],{"_key":15},"CVE-2018-16428",{"_key":17},"CVE-2018-16429",{"_key":19},"CVE-2019-12450",[],[],[23,24,25],{"_key":15},{"_key":17},{"_key":19},"2019-06-21T08:18:06Z","2026-02-04T03:51:40.485800Z",{"cisa_kev":29,"cisa_ransomware":29,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[31,37,42,46,50,54,59,63],{"url":32,"sources":33,"tags":35},"https://www.suse.com/support/update/announcement/2019/suse-su-20191596-1/",[34],"osv_suse",[36],"Advisory",{"url":38,"sources":39,"tags":40},"https://bugzilla.suse.com/1107116",[34],[41],"REPORT",{"url":43,"sources":44,"tags":45},"https://bugzilla.suse.com/1107121",[34],[41],{"url":47,"sources":48,"tags":49},"https://bugzilla.suse.com/1111499",[34],[41],{"url":51,"sources":52,"tags":53},"https://bugzilla.suse.com/1137001",[34],[41],{"url":55,"sources":56,"tags":57},"https://www.suse.com/security/cve/CVE-2018-16428",[34],[58],"WEB",{"url":60,"sources":61,"tags":62},"https://www.suse.com/security/cve/CVE-2018-16429",[34],[58],{"url":64,"sources":65,"tags":66},"https://www.suse.com/security/cve/CVE-2019-12450",[34],[58],[],[],[],[71,84],{"ecosystem":72,"name":73,"vendor":74,"product":75,"cpe_part":9,"purl_type":76,"purl_namespace":74,"purl_name":75,"source":9,"versions":77},"SUSE Linux Enterprise","glib2","suse","glib2&distro=SUSE Linux Enterprise Server 12 SP1-LTSS","rpm",[78],{"version":79,"is_range":80,"range_type":81,"version_start":9,"version_start_type":9,"version_end":82,"version_end_type":83,"fixed_in":9},"lt2_38_2_7_9_2",true,"ecosystem","2.38.2-7.9.2","excluding",{"ecosystem":72,"name":73,"vendor":74,"product":85,"cpe_part":9,"purl_type":76,"purl_namespace":74,"purl_name":85,"source":9,"versions":86},"glib2&distro=SUSE Linux Enterprise Server 12-LTSS",[87],{"version":79,"is_range":80,"range_type":81,"version_start":9,"version_start_type":9,"version_end":82,"version_end_type":83,"fixed_in":9}]