Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2026:0286-1

Опубликовано: 23 янв. 2026
Источник: suse-cvrf

Описание

Security update for glib2

This update for glib2 fixes the following issues:

  • CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).

Список пакетов

Container bci/spack:latest
glib2-tools-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
Container suse/kiosk/pulseaudio:latest
glib2-tools-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libglib-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
Container suse/kiosk/xorg:latest
glib2-tools-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libglib-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
Image SLES15-SP7-SAP-BYOS-EC2
glib2-tools-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libglib-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
libgthread-2_0-0-2.78.6-150600.4.28.1
SUSE Linux Enterprise Module for Basesystem 15 SP7
glib2-devel-2.78.6-150600.4.28.1
glib2-lang-2.78.6-150600.4.28.1
glib2-tools-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libgio-2_0-0-32bit-2.78.6-150600.4.28.1
libglib-2_0-0-2.78.6-150600.4.28.1
libglib-2_0-0-32bit-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-32bit-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-32bit-2.78.6-150600.4.28.1
libgthread-2_0-0-2.78.6-150600.4.28.1
openSUSE Leap 15.6
gio-branding-upstream-2.78.6-150600.4.28.1
glib2-devel-2.78.6-150600.4.28.1
glib2-devel-32bit-2.78.6-150600.4.28.1
glib2-devel-static-2.78.6-150600.4.28.1
glib2-doc-2.78.6-150600.4.28.1
glib2-lang-2.78.6-150600.4.28.1
glib2-tests-devel-2.78.6-150600.4.28.1
glib2-tools-2.78.6-150600.4.28.1
glib2-tools-32bit-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libgio-2_0-0-32bit-2.78.6-150600.4.28.1
libglib-2_0-0-2.78.6-150600.4.28.1
libglib-2_0-0-32bit-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-32bit-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-32bit-2.78.6-150600.4.28.1
libgthread-2_0-0-2.78.6-150600.4.28.1
libgthread-2_0-0-32bit-2.78.6-150600.4.28.1

Описание

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).


Затронутые продукты
Container bci/spack:latest:glib2-tools-2.78.6-150600.4.28.1
Container bci/spack:latest:libgio-2_0-0-2.78.6-150600.4.28.1
Container bci/spack:latest:libgmodule-2_0-0-2.78.6-150600.4.28.1
Container bci/spack:latest:libgobject-2_0-0-2.78.6-150600.4.28.1

Ссылки