{"affected":[{"ecosystem_specific":{"binaries":[{"glib2-tools":"2.62.6-150200.3.42.1","libgio-2_0-0":"2.62.6-150200.3.42.1","libglib-2_0-0":"2.62.6-150200.3.42.1","libgmodule-2_0-0":"2.62.6-150200.3.42.1","libgobject-2_0-0":"2.62.6-150200.3.42.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"glib2","purl":"pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.62.6-150200.3.42.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glib2 fixes the following issues:\n\n- CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354).\n- CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355).\n- CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353).\n","id":"SUSE-SU-2026:0355-1","modified":"2026-01-31T02:04:37Z","published":"2026-01-31T02:04:37Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260355-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257353"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257355"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1485"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1489"}],"related":["CVE-2026-1484","CVE-2026-1485","CVE-2026-1489"],"summary":"Security update for glib2","upstream":["CVE-2026-1484","CVE-2026-1485","CVE-2026-1489"]}