<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for glib2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:20493-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-02-17T09:52:57Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-02-17T09:52:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-02-17T09:52:57Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for glib2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for glib2 fixes the following issues:

- CVE-2025-13601: Fixed integer overflow in in g_escape_uri_string() (bsc#1254297).
- CVE-2025-14087: Fixed buffer underflow in GVariant parser leads to heap corruption (bsc#1254662).
- CVE-2025-14512: Fixed integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow (bsc#1254878).
- CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354).
- CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355).
- CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353).
- CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.1-405</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620493-1/</URL>
      <Description>Link for SUSE-SU-2026:20493-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:20493-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254297</URL>
      <Description>SUSE Bug 1254297</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254662</URL>
      <Description>SUSE Bug 1254662</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254878</URL>
      <Description>SUSE Bug 1254878</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257049</URL>
      <Description>SUSE Bug 1257049</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257353</URL>
      <Description>SUSE Bug 1257353</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257354</URL>
      <Description>SUSE Bug 1257354</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257355</URL>
      <Description>SUSE Bug 1257355</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-13601/</URL>
      <Description>SUSE CVE CVE-2025-13601 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-14087/</URL>
      <Description>SUSE CVE CVE-2025-14087 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-14512/</URL>
      <Description>SUSE CVE CVE-2025-14512 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-0988/</URL>
      <Description>SUSE CVE CVE-2026-0988 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-1484/</URL>
      <Description>SUSE CVE CVE-2026-1484 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-1485/</URL>
      <Description>SUSE CVE CVE-2026-1485 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-1489/</URL>
      <Description>SUSE CVE CVE-2026-1489 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.1">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.1">
        <FullProductName ProductID="SUSE Linux Micro 6.1" CPE="cpe:/o:suse:sl-micro:6.1">SUSE Linux Micro 6.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="glib2-tools-2.78.6-slfo.1.1_6.1">
      <FullProductName ProductID="glib2-tools-2.78.6-slfo.1.1_6.1">glib2-tools-2.78.6-slfo.1.1_6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgio-2_0-0-2.78.6-slfo.1.1_6.1">
      <FullProductName ProductID="libgio-2_0-0-2.78.6-slfo.1.1_6.1">libgio-2_0-0-2.78.6-slfo.1.1_6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libglib-2_0-0-2.78.6-slfo.1.1_6.1">
      <FullProductName ProductID="libglib-2_0-0-2.78.6-slfo.1.1_6.1">libglib-2_0-0-2.78.6-slfo.1.1_6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgmodule-2_0-0-2.78.6-slfo.1.1_6.1">
      <FullProductName ProductID="libgmodule-2_0-0-2.78.6-slfo.1.1_6.1">libgmodule-2_0-0-2.78.6-slfo.1.1_6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgobject-2_0-0-2.78.6-slfo.1.1_6.1">
      <FullProductName ProductID="libgobject-2_0-0-2.78.6-slfo.1.1_6.1">libgobject-2_0-0-2.78.6-slfo.1.1_6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="glib2-tools-2.78.6-slfo.1.1_6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_6.1">glib2-tools-2.78.6-slfo.1.1_6.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgio-2_0-0-2.78.6-slfo.1.1_6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_6.1">libgio-2_0-0-2.78.6-slfo.1.1_6.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libglib-2_0-0-2.78.6-slfo.1.1_6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_6.1">libglib-2_0-0-2.78.6-slfo.1.1_6.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgmodule-2_0-0-2.78.6-slfo.1.1_6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_6.1">libgmodule-2_0-0-2.78.6-slfo.1.1_6.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgobject-2_0-0-2.78.6-slfo.1.1_6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_6.1">libgobject-2_0-0-2.78.6-slfo.1.1_6.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.</Note>
    </Notes>
    <CVE>CVE-2025-13601</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620493-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-13601.html</URL>
        <Description>CVE-2025-13601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254297</URL>
        <Description>SUSE Bug 1254297</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.</Note>
    </Notes>
    <CVE>CVE-2025-14087</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620493-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-14087.html</URL>
        <Description>CVE-2025-14087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254662</URL>
        <Description>SUSE Bug 1254662</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.</Note>
    </Notes>
    <CVE>CVE-2025-14512</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620493-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-14512.html</URL>
        <Description>CVE-2025-14512</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254878</URL>
        <Description>SUSE Bug 1254878</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).</Note>
    </Notes>
    <CVE>CVE-2026-0988</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620493-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-0988.html</URL>
        <Description>CVE-2026-0988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257049</URL>
        <Description>SUSE Bug 1257049</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.</Note>
    </Notes>
    <CVE>CVE-2026-1484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620493-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-1484.html</URL>
        <Description>CVE-2026-1484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257355</URL>
        <Description>SUSE Bug 1257355</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.</Note>
    </Notes>
    <CVE>CVE-2026-1485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620493-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-1485.html</URL>
        <Description>CVE-2026-1485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257354</URL>
        <Description>SUSE Bug 1257354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.</Note>
    </Notes>
    <CVE>CVE-2026-1489</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620493-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-1489.html</URL>
        <Description>CVE-2026-1489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257353</URL>
        <Description>SUSE Bug 1257353</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
