{"affected":[{"ecosystem_specific":{"binaries":[{"glib2-tools":"2.62.6-150200.3.39.1","libgio-2_0-0":"2.62.6-150200.3.39.1","libglib-2_0-0":"2.62.6-150200.3.39.1","libgmodule-2_0-0":"2.62.6-150200.3.39.1","libgobject-2_0-0":"2.62.6-150200.3.39.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"glib2","purl":"pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.62.6-150200.3.39.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glib2 fixes the following issues:\n\n- CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).\n","id":"SUSE-SU-2026:0264-1","modified":"2026-01-23T04:33:57Z","published":"2026-01-23T04:33:57Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260264-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0988"}],"related":["CVE-2026-0988"],"summary":"Security update for glib2","upstream":["CVE-2026-0988"]}