Package "libgio-2.0-dev-bin"
| Name: |
libgio-2.0-dev-bin
|
Description: |
Development utilities for GLib, GObject and GIO libraries
|
| Latest version: |
2.86.0-2ubuntu0.3 |
| Release: |
questing (25.10) |
| Level: |
security |
| Repository: |
main |
| Head package: |
glib2.0 |
| Homepage: |
https://gitlab.gnome.org/GNOME/glib |
Links
Download "libgio-2.0-dev-bin"
Other versions of "libgio-2.0-dev-bin" in Questing
Changelog
|
glib2.0 (2.86.0-2ubuntu0.3) questing-security; urgency=medium
* SECURITY UPDATE: integer overflow in Base64 encoding
- debian/patches/CVE-2026-1484-1.patch: use gsize to prevent potential
overflow in glib/gbase64.c.
- debian/patches/CVE-2026-1484-2.patch: ensure that the out value is
within allocated size in glib/gbase64.c.
- CVE-2026-1484
* SECURITY UPDATE: buffer underflow via header length
- debian/patches/CVE-2026-1485.patch: do not overflow if header is
longer than MAXINT in gio/gcontenttype-fdo.c.
- CVE-2026-1485
* SECURITY UPDATE: integer overflow via Unicode case conversion
- debian/patches/CVE-2026-1489-1.patch: use size_t for output_marks
length in glib/guniprop.c.
- debian/patches/CVE-2026-1489-2.patch: do not convert size_t to gint
in glib/guniprop.c.
- debian/patches/CVE-2026-1489-3.patch: ensure we do not overflow size
in glib/guniprop.c.
- debian/patches/CVE-2026-1489-4.patch: add test debug information when
parsing input files in glib/tests/unicode.c.
- CVE-2026-1489
-- Marc Deslauriers <email address hidden> Wed, 28 Jan 2026 12:38:28 -0500
|
| Source diff to previous version |
| CVE-2026-1484 |
A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calcu |
| CVE-2026-1485 |
A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a |
| CVE-2026-1489 |
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processin |
|
|
glib2.0 (2.86.0-2ubuntu0.2) questing-security; urgency=medium
* SECURITY UPDATE: Integer overflow in g_buffered_input_stream_peek()
- debian/patches/CVE-2026-0988.patch: fix a potential integer overflow
in peek() in gio/gbufferedinputstream.c,
gio/tests/buffered-input-stream.c.
- CVE-2026-0988
-- Marc Deslauriers <email address hidden> Tue, 20 Jan 2026 08:06:16 -0500
|
| Source diff to previous version |
|
glib2.0 (2.86.0-2ubuntu0.1) questing-security; urgency=medium
* SECURITY UPDATE: heap overflow in g_escape_uri_string()
- debian/patches/CVE-2025-13601.patch: add overflow check in
glib/gconvert.c.
- CVE-2025-13601
* SECURITY UPDATE: buffer underflow through glib/gvariant
- debian/patches/CVE-2025-14087-1.patch: fix potential integer overflow
parsing (byte)strings in glib/gvariant-parser.c.
- debian/patches/CVE-2025-14087-2.patch: use size_t to count numbers of
child elements in glib/gvariant-parser.c.
- debian/patches/CVE-2025-14087-3.patch: convert error handling code to
use size_t in glib/gvariant-parser.c.
- CVE-2025-14087
* SECURITY UPDATE: integer overflow in gfileattribute
- debian/patches/gfileattribute-overflow.patch: add overflow check in
gio/gfileattribute.c.
- No CVE number
-- Marc Deslauriers <email address hidden> Wed, 10 Dec 2025 10:20:04 -0500
|
| CVE-2025-13601 |
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the |
| CVE-2025-14087 |
A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potenti |
|
About
-
Send Feedback to @ubuntu_updates