Описание
Security update for glib2
This update for glib2 fixes the following issues:
- CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).
Список пакетов
Container bci/spack:latest
glib2-tools-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
Container suse/kiosk/pulseaudio:latest
glib2-tools-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libglib-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
Container suse/kiosk/xorg:latest
glib2-tools-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libglib-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
Image SLES15-SP7-SAP-BYOS-EC2
glib2-tools-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libglib-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
libgthread-2_0-0-2.78.6-150600.4.28.1
SUSE Linux Enterprise Module for Basesystem 15 SP7
glib2-devel-2.78.6-150600.4.28.1
glib2-lang-2.78.6-150600.4.28.1
glib2-tools-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libgio-2_0-0-32bit-2.78.6-150600.4.28.1
libglib-2_0-0-2.78.6-150600.4.28.1
libglib-2_0-0-32bit-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-32bit-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-32bit-2.78.6-150600.4.28.1
libgthread-2_0-0-2.78.6-150600.4.28.1
openSUSE Leap 15.6
gio-branding-upstream-2.78.6-150600.4.28.1
glib2-devel-2.78.6-150600.4.28.1
glib2-devel-32bit-2.78.6-150600.4.28.1
glib2-devel-static-2.78.6-150600.4.28.1
glib2-doc-2.78.6-150600.4.28.1
glib2-lang-2.78.6-150600.4.28.1
glib2-tests-devel-2.78.6-150600.4.28.1
glib2-tools-2.78.6-150600.4.28.1
glib2-tools-32bit-2.78.6-150600.4.28.1
libgio-2_0-0-2.78.6-150600.4.28.1
libgio-2_0-0-32bit-2.78.6-150600.4.28.1
libglib-2_0-0-2.78.6-150600.4.28.1
libglib-2_0-0-32bit-2.78.6-150600.4.28.1
libgmodule-2_0-0-2.78.6-150600.4.28.1
libgmodule-2_0-0-32bit-2.78.6-150600.4.28.1
libgobject-2_0-0-2.78.6-150600.4.28.1
libgobject-2_0-0-32bit-2.78.6-150600.4.28.1
libgthread-2_0-0-2.78.6-150600.4.28.1
libgthread-2_0-0-32bit-2.78.6-150600.4.28.1
Ссылки
- Link for SUSE-SU-2026:0286-1
- E-Mail link for SUSE-SU-2026:0286-1
- SUSE Security Ratings
- SUSE Bug 1257049
- SUSE CVE CVE-2026-0988 page
Описание
A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
Затронутые продукты
Container bci/spack:latest:glib2-tools-2.78.6-150600.4.28.1
Container bci/spack:latest:libgio-2_0-0-2.78.6-150600.4.28.1
Container bci/spack:latest:libgmodule-2_0-0-2.78.6-150600.4.28.1
Container bci/spack:latest:libgobject-2_0-0-2.78.6-150600.4.28.1
Ссылки
- CVE-2026-0988
- SUSE Bug 1257049