<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for glib2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:0355-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-31T02:04:37Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-31T02:04:37Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-31T02:04:37Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for glib2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for glib2 fixes the following issues:

- CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354).
- CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355).
- CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/sle-micro-rancher/5.2:latest-2026-355,Container suse/sle-micro/5.2/toolbox:latest-2026-355,SUSE-2026-355,SUSE-SUSE-MicroOS-5.2-2026-355</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260355-1/</URL>
      <Description>Link for SUSE-SU-2026:0355-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2026-February/024001.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:0355-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257353</URL>
      <Description>SUSE Bug 1257353</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257354</URL>
      <Description>SUSE Bug 1257354</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257355</URL>
      <Description>SUSE Bug 1257355</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-1484/</URL>
      <Description>SUSE CVE CVE-2026-1484 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-1485/</URL>
      <Description>SUSE CVE CVE-2026-1485 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-1489/</URL>
      <Description>SUSE CVE CVE-2026-1489 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/sle-micro-rancher/5.2:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro-rancher/5.2:latest">
        <FullProductName ProductID="Container suse/sle-micro-rancher/5.2:latest">Container suse/sle-micro-rancher/5.2:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle-micro/5.2/toolbox:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro/5.2/toolbox:latest">
        <FullProductName ProductID="Container suse/sle-micro/5.2/toolbox:latest">Container suse/sle-micro/5.2/toolbox:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.2">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2" CPE="cpe:/o:suse:suse-microos:5.2">SUSE Linux Enterprise Micro 5.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libglib-2_0-0-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libglib-2_0-0-2.62.6-150200.3.42.1">libglib-2_0-0-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgmodule-2_0-0-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgmodule-2_0-0-2.62.6-150200.3.42.1">libgmodule-2_0-0-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgobject-2_0-0-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgobject-2_0-0-2.62.6-150200.3.42.1">libgobject-2_0-0-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gio-branding-upstream-2.62.6-150200.3.42.1">
      <FullProductName ProductID="gio-branding-upstream-2.62.6-150200.3.42.1">gio-branding-upstream-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glib2-devel-2.62.6-150200.3.42.1">
      <FullProductName ProductID="glib2-devel-2.62.6-150200.3.42.1">glib2-devel-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glib2-devel-32bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="glib2-devel-32bit-2.62.6-150200.3.42.1">glib2-devel-32bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glib2-devel-64bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="glib2-devel-64bit-2.62.6-150200.3.42.1">glib2-devel-64bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glib2-devel-static-2.62.6-150200.3.42.1">
      <FullProductName ProductID="glib2-devel-static-2.62.6-150200.3.42.1">glib2-devel-static-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glib2-lang-2.62.6-150200.3.42.1">
      <FullProductName ProductID="glib2-lang-2.62.6-150200.3.42.1">glib2-lang-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glib2-tests-2.62.6-150200.3.42.1">
      <FullProductName ProductID="glib2-tests-2.62.6-150200.3.42.1">glib2-tests-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glib2-tools-2.62.6-150200.3.42.1">
      <FullProductName ProductID="glib2-tools-2.62.6-150200.3.42.1">glib2-tools-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glib2-tools-32bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="glib2-tools-32bit-2.62.6-150200.3.42.1">glib2-tools-32bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glib2-tools-64bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="glib2-tools-64bit-2.62.6-150200.3.42.1">glib2-tools-64bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgio-2_0-0-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgio-2_0-0-2.62.6-150200.3.42.1">libgio-2_0-0-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgio-2_0-0-32bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgio-2_0-0-32bit-2.62.6-150200.3.42.1">libgio-2_0-0-32bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgio-2_0-0-64bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgio-2_0-0-64bit-2.62.6-150200.3.42.1">libgio-2_0-0-64bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgio-fam-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgio-fam-2.62.6-150200.3.42.1">libgio-fam-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgio-fam-32bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgio-fam-32bit-2.62.6-150200.3.42.1">libgio-fam-32bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgio-fam-64bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgio-fam-64bit-2.62.6-150200.3.42.1">libgio-fam-64bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libglib-2_0-0-32bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libglib-2_0-0-32bit-2.62.6-150200.3.42.1">libglib-2_0-0-32bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libglib-2_0-0-64bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libglib-2_0-0-64bit-2.62.6-150200.3.42.1">libglib-2_0-0-64bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgmodule-2_0-0-32bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgmodule-2_0-0-32bit-2.62.6-150200.3.42.1">libgmodule-2_0-0-32bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgmodule-2_0-0-64bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgmodule-2_0-0-64bit-2.62.6-150200.3.42.1">libgmodule-2_0-0-64bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgobject-2_0-0-32bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgobject-2_0-0-32bit-2.62.6-150200.3.42.1">libgobject-2_0-0-32bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgobject-2_0-0-64bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgobject-2_0-0-64bit-2.62.6-150200.3.42.1">libgobject-2_0-0-64bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgthread-2_0-0-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgthread-2_0-0-2.62.6-150200.3.42.1">libgthread-2_0-0-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgthread-2_0-0-32bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgthread-2_0-0-32bit-2.62.6-150200.3.42.1">libgthread-2_0-0-32bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgthread-2_0-0-64bit-2.62.6-150200.3.42.1">
      <FullProductName ProductID="libgthread-2_0-0-64bit-2.62.6-150200.3.42.1">libgthread-2_0-0-64bit-2.62.6-150200.3.42.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libglib-2_0-0-2.62.6-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.2:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.2:latest:libglib-2_0-0-2.62.6-150200.3.42.1">libglib-2_0-0-2.62.6-150200.3.42.1 as a component of Container suse/sle-micro-rancher/5.2:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgmodule-2_0-0-2.62.6-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.2:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.2:latest:libgmodule-2_0-0-2.62.6-150200.3.42.1">libgmodule-2_0-0-2.62.6-150200.3.42.1 as a component of Container suse/sle-micro-rancher/5.2:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgobject-2_0-0-2.62.6-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.2:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.2:latest:libgobject-2_0-0-2.62.6-150200.3.42.1">libgobject-2_0-0-2.62.6-150200.3.42.1 as a component of Container suse/sle-micro-rancher/5.2:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libglib-2_0-0-2.62.6-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.2/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.2/toolbox:latest:libglib-2_0-0-2.62.6-150200.3.42.1">libglib-2_0-0-2.62.6-150200.3.42.1 as a component of Container suse/sle-micro/5.2/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgmodule-2_0-0-2.62.6-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.2/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.2/toolbox:latest:libgmodule-2_0-0-2.62.6-150200.3.42.1">libgmodule-2_0-0-2.62.6-150200.3.42.1 as a component of Container suse/sle-micro/5.2/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="glib2-tools-2.62.6-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.42.1">glib2-tools-2.62.6-150200.3.42.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgio-2_0-0-2.62.6-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.42.1">libgio-2_0-0-2.62.6-150200.3.42.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libglib-2_0-0-2.62.6-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.42.1">libglib-2_0-0-2.62.6-150200.3.42.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgmodule-2_0-0-2.62.6-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.42.1">libgmodule-2_0-0-2.62.6-150200.3.42.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgobject-2_0-0-2.62.6-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.42.1">libgobject-2_0-0-2.62.6-150200.3.42.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.</Note>
    </Notes>
    <CVE>CVE-2026-1484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libglib-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libgmodule-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libgobject-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:libglib-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:libgmodule-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260355-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-1484.html</URL>
        <Description>CVE-2026-1484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257355</URL>
        <Description>SUSE Bug 1257355</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.</Note>
    </Notes>
    <CVE>CVE-2026-1485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libglib-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libgmodule-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libgobject-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:libglib-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:libgmodule-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260355-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-1485.html</URL>
        <Description>CVE-2026-1485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257354</URL>
        <Description>SUSE Bug 1257354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.</Note>
    </Notes>
    <CVE>CVE-2026-1489</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libglib-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libgmodule-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libgobject-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:libglib-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>Container suse/sle-micro/5.2/toolbox:latest:libgmodule-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.42.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260355-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-1489.html</URL>
        <Description>CVE-2026-1489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257353</URL>
        <Description>SUSE Bug 1257353</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
