<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for glib2 is now available for openEuler-24.03-LTS-SP2</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-2904</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-12-30</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-12-30</InitialReleaseDate>
		<CurrentReleaseDate>2025-12-30</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-12-30</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">glib2 security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for glib2 is now available for openEuler-24.03-LTS-SP2</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">GLib is a bundle of three (formerly five) low-level system libraries written in C and developed mainly by GNOME. GLib&amp;apos;s code was separated from GTK, so it can be used by software other than GNOME and has been developed in parallel ever since.

Security Fix(es):

A vulnerability was found in GNOME GLib (the affected version unknown). It has been declared as critical. The CWE definition for the vulnerability is CWE-120. The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow. As an impact it is known to affect confidentiality, integrity, and availability. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.(CVE-2025-14087)

A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib&apos;s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.(CVE-2025-14512)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for glib2 is now available for openEuler-20.03-LTS-SP4/openEuler-24.03-LTS-SP2.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">glib2</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2904</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-14087</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-14512</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-14087</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-14512</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openEuler-24.03-LTS-SP2</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="glib2-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-2.78.3-12.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debuginfo-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-debuginfo-2.78.3-12.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debugsource-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-debugsource-2.78.3-12.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-devel-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-devel-2.78.3-12.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-static-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-static-2.78.3-12.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-tests-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-tests-2.78.3-12.oe2403sp2.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="glib2-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-2.78.3-12.oe2403sp2.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="glib2-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-2.78.3-12.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debuginfo-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-debuginfo-2.78.3-12.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debugsource-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-debugsource-2.78.3-12.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-devel-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-devel-2.78.3-12.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-static-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-static-2.78.3-12.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-tests-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-tests-2.78.3-12.oe2403sp2.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="glib2-help-2.78.3-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">glib2-help-2.78.3-12.oe2403sp2.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in GNOME GLib (the affected version unknown). It has been declared as critical. The CWE definition for the vulnerability is CWE-120. The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow. As an impact it is known to affect confidentiality, integrity, and availability. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.</Note>
		</Notes>
		<ReleaseDate>2025-12-30</ReleaseDate>
		<CVE>CVE-2025-14087</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.6</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>glib2 security update</Description>
				<DATE>2025-12-30</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2904</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib&apos;s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.</Note>
		</Notes>
		<ReleaseDate>2025-12-30</ReleaseDate>
		<CVE>CVE-2025-14512</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>glib2 security update</Description>
				<DATE>2025-12-30</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2904</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>