{"affected":[{"ecosystem_specific":{"binaries":[{"glib2-tools":"2.76.2-12.1","libgio-2_0-0":"2.76.2-12.1","libglib-2_0-0":"2.76.2-12.1","libgmodule-2_0-0":"2.76.2-12.1","libgobject-2_0-0":"2.76.2-12.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"glib2","purl":"pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.76.2-12.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glib2 fixes the following issues:\n\n- CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354).\n- CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355).\n- CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353).\n- CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).\n","id":"SUSE-SU-2026:20446-1","modified":"2026-02-16T14:25:53Z","published":"2026-02-16T14:25:53Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620446-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257049"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257353"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257355"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0988"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1485"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1489"}],"related":["CVE-2026-0988","CVE-2026-1484","CVE-2026-1485","CVE-2026-1489"],"summary":"Security update for glib2","upstream":["CVE-2026-0988","CVE-2026-1484","CVE-2026-1485","CVE-2026-1489"]}