Back to glib2.0 PTS page

Accepted glib2.0 2.50.3-2+deb9u3 (source) into oldoldstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon,  6 Jun 2022 14:35:42 CEST
Source: glib2.0
Binary: libglib2.0-0 libglib2.0-tests libglib2.0-udeb libglib2.0-bin libglib2.0-dev libglib2.0-0-dbg libglib2.0-data libglib2.0-doc libgio-fam
Architecture: source
Version: 2.50.3-2+deb9u3
Distribution: stretch-security
Urgency: high
Maintainer: Debian GNOME Maintainers <pkg-gnome-maintainers@lists.alioth.debian.org>
Changed-By: Markus Koschany <apo@debian.org>
Description:
 libgio-fam - GLib Input, Output and Streaming Library (fam module)
 libglib2.0-0 - GLib library of C routines
 libglib2.0-0-dbg - Debugging symbols for the GLib libraries
 libglib2.0-bin - Programs for the GLib library
 libglib2.0-data - Common files for GLib library
 libglib2.0-dev - Development files for the GLib library
 libglib2.0-doc - Documentation files for the GLib library
 libglib2.0-tests - GLib library of C routines - installed tests
 libglib2.0-udeb - GLib library of C routines - minimal runtime (udeb)
Checksums-Sha1:
 6b2d318aa39f2c19a608746c37a525f90e1d5999 3429 glib2.0_2.50.3-2+deb9u3.dsc
 6a583e13bf5232d4dca9f968a23d89abb9acebd9 87720 glib2.0_2.50.3-2+deb9u3.debian.tar.xz
 7ce3ca43a3872763c2bef6ebdc3d4c32cca10f3a 10984 glib2.0_2.50.3-2+deb9u3_amd64.buildinfo
Checksums-Sha256:
 7e080dfb2f6aeb8db835c1aef845294665d99fd07f9494c4ff022cedb2bcd059 3429 glib2.0_2.50.3-2+deb9u3.dsc
 c8c0b58d5cb5c510546bfbaa6289ac93417dbac6efeb289d938d816458a358c8 87720 glib2.0_2.50.3-2+deb9u3.debian.tar.xz
 2df98b6c307b7cf009439240290d758d0351c9f81ddc68e140621583209812b3 10984 glib2.0_2.50.3-2+deb9u3_amd64.buildinfo
Changes:
 glib2.0 (2.50.3-2+deb9u3) stretch-security; urgency=high
 .
   * Non-maintainer upload by the LTS team.
   * Fix CVE-2021-28153:
     When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to
     replace a path that is a dangling symlink, it incorrectly also creates the
     target of the symlink as an empty file, which could conceivably have
     security relevance if the symlink is attacker-controlled. (If the path is
     a symlink to a file that already exists, then the contents of that file
     correctly remain unchanged.)
   * Fix CVE-2021-27218:
     If g_byte_array_new_take() was called with a buffer of 4GB or more on a
     64-bit platform, the length would be truncated modulo 2**32, causing
     unintended length truncation.
   * Fix CVE-2021-27219:
     The function g_bytes_new has an integer overflow on 64-bit platforms due to
     an implicit cast from 64 bits to 32 bits. The overflow could potentially
     lead to memory corruption.
Files:
 c0e3a6596ec864aa54ccd5c421dc9339 3429 libs optional glib2.0_2.50.3-2+deb9u3.dsc
 bbf0df279a55f4db2ce4acbf6008030b 87720 libs optional glib2.0_2.50.3-2+deb9u3.debian.tar.xz
 0b15066960587385e54ceb18a34ea132 10984 libs optional glib2.0_2.50.3-2+deb9u3_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=GKLp
-----END PGP SIGNATURE-----