<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for glib2 is now available for openEuler-24.03-LTS</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-1293</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-02-06</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-02-06</InitialReleaseDate>
		<CurrentReleaseDate>2026-02-06</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-02-06</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">glib2 security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for glib2 is now available for openEuler-24.03-LTS</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">GLib is a bundle of three (formerly five) low-level system libraries written in C and developed mainly by GNOME. GLib&amp;apos;s code was separated from GTK, so it can be used by software other than GNOME and has been developed in parallel ever since.

Security Fix(es):

Integer Overflow vulnerability in the g_buffered_input_stream_peek() function of the GLib library. The issue is caused by missing validation of the offset and count parameters, leading to an unsafe arithmetic operation during length calculation. When specially crafted values are provided, the offset + count computation may overflow, resulting in an incorrect size being passed to memcpy(). This can trigger a heap or stack buffer overflow and lead to a segmentation fault. Exploitation is subject to strict preconditions and primarily impacts availability by causing application crashes.(CVE-2026-0988)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for glib2 is now available for openEuler-24.03-LTS.

openEuler Security has rated this update as having a security impact of low. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Low</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">glib2</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1293</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-0988</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-0988</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="glib2-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-2.78.3-13.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debuginfo-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-debuginfo-2.78.3-13.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debugsource-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-debugsource-2.78.3-13.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-devel-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-devel-2.78.3-13.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-static-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-static-2.78.3-13.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-tests-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-tests-2.78.3-13.oe2403.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="glib2-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-2.78.3-13.oe2403.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="glib2-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-2.78.3-13.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debuginfo-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-debuginfo-2.78.3-13.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debugsource-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-debugsource-2.78.3-13.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-devel-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-devel-2.78.3-13.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-static-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-static-2.78.3-13.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-tests-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-tests-2.78.3-13.oe2403.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="glib2-help-2.78.3-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">glib2-help-2.78.3-13.oe2403.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer Overflow vulnerability in the g_buffered_input_stream_peek() function of the GLib library. The issue is caused by missing validation of the offset and count parameters, leading to an unsafe arithmetic operation during length calculation. When specially crafted values are provided, the offset + count computation may overflow, resulting in an incorrect size being passed to memcpy(). This can trigger a heap or stack buffer overflow and lead to a segmentation fault. Exploitation is subject to strict preconditions and primarily impacts availability by causing application crashes.</Note>
		</Notes>
		<ReleaseDate>2026-02-06</ReleaseDate>
		<CVE>CVE-2026-0988</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.7</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>glib2 security update</Description>
				<DATE>2026-02-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1293</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>