{"schema_version":"1.7.2","id":"OESA-2026-1294","modified":"2026-02-06T15:54:36Z","published":"2026-02-06T15:54:36Z","upstream":["CVE-2026-0988"],"summary":"glib2 security update","details":"GLib is a bundle of three (formerly five) low-level system libraries written in C and developed mainly by GNOME. GLib&amp;apos;s code was separated from GTK, so it can be used by software other than GNOME and has been developed in parallel ever since.\r\n\r\nSecurity Fix(es):\n\nInteger Overflow vulnerability in the g_buffered_input_stream_peek() function of the GLib library. The issue is caused by missing validation of the offset and count parameters, leading to an unsafe arithmetic operation during length calculation. When specially crafted values are provided, the offset + count computation may overflow, resulting in an incorrect size being passed to memcpy(). This can trigger a heap or stack buffer overflow and lead to a segmentation fault. Exploitation is subject to strict preconditions and primarily impacts availability by causing application crashes.(CVE-2026-0988)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP1","name":"glib2","purl":"pkg:rpm/openEuler/glib2&distro=openEuler-24.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.78.3-13.oe2403sp1"}]}],"ecosystem_specific":{"aarch64":["glib2-2.78.3-13.oe2403sp1.aarch64.rpm","glib2-debuginfo-2.78.3-13.oe2403sp1.aarch64.rpm","glib2-debugsource-2.78.3-13.oe2403sp1.aarch64.rpm","glib2-devel-2.78.3-13.oe2403sp1.aarch64.rpm","glib2-static-2.78.3-13.oe2403sp1.aarch64.rpm","glib2-tests-2.78.3-13.oe2403sp1.aarch64.rpm"],"noarch":["glib2-help-2.78.3-13.oe2403sp1.noarch.rpm"],"src":["glib2-2.78.3-13.oe2403sp1.src.rpm"],"x86_64":["glib2-2.78.3-13.oe2403sp1.x86_64.rpm","glib2-debuginfo-2.78.3-13.oe2403sp1.x86_64.rpm","glib2-debugsource-2.78.3-13.oe2403sp1.x86_64.rpm","glib2-devel-2.78.3-13.oe2403sp1.x86_64.rpm","glib2-static-2.78.3-13.oe2403sp1.x86_64.rpm","glib2-tests-2.78.3-13.oe2403sp1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1294"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0988"}],"database_specific":{"severity":"Low"}}
