{"affected":[{"ecosystem_specific":{"binaries":[{"glib2-devel":"2.48.2-12.58.1","glib2-devel-static":"2.48.2-12.58.1","glib2-lang":"2.48.2-12.58.1","glib2-tools":"2.48.2-12.58.1","libgio-2_0-0":"2.48.2-12.58.1","libgio-2_0-0-32bit":"2.48.2-12.58.1","libglib-2_0-0":"2.48.2-12.58.1","libglib-2_0-0-32bit":"2.48.2-12.58.1","libgmodule-2_0-0":"2.48.2-12.58.1","libgmodule-2_0-0-32bit":"2.48.2-12.58.1","libgobject-2_0-0":"2.48.2-12.58.1","libgobject-2_0-0-32bit":"2.48.2-12.58.1","libgthread-2_0-0":"2.48.2-12.58.1","libgthread-2_0-0-32bit":"2.48.2-12.58.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"glib2","purl":"pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.48.2-12.58.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glib2-devel":"2.48.2-12.58.1","glib2-devel-static":"2.48.2-12.58.1","glib2-lang":"2.48.2-12.58.1","glib2-tools":"2.48.2-12.58.1","libgio-2_0-0":"2.48.2-12.58.1","libgio-2_0-0-32bit":"2.48.2-12.58.1","libglib-2_0-0":"2.48.2-12.58.1","libglib-2_0-0-32bit":"2.48.2-12.58.1","libgmodule-2_0-0":"2.48.2-12.58.1","libgmodule-2_0-0-32bit":"2.48.2-12.58.1","libgobject-2_0-0":"2.48.2-12.58.1","libgobject-2_0-0-32bit":"2.48.2-12.58.1","libgthread-2_0-0":"2.48.2-12.58.1","libgthread-2_0-0-32bit":"2.48.2-12.58.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"glib2","purl":"pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.48.2-12.58.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glib2 fixes the following issues:\n\n- CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354).\n- CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355).\n- CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353).\n","id":"SUSE-SU-2026:0372-1","modified":"2026-02-04T01:43:44Z","published":"2026-02-04T01:43:44Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260372-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257353"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257355"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1485"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1489"}],"related":["CVE-2026-1484","CVE-2026-1485","CVE-2026-1489"],"summary":"Security update for glib2","upstream":["CVE-2026-1484","CVE-2026-1485","CVE-2026-1489"]}