{"schema_version":"1.7.2","id":"OESA-2026-1683","modified":"2026-03-20T14:25:22Z","published":"2026-03-20T14:25:22Z","upstream":["CVE-2026-1489"],"summary":"glib2 security update","details":"GLib is a bundle of three (formerly five) low-level system libraries written in C and developed mainly by GNOME. GLib&amp;apos;s code was separated from GTK, so it can be used by software other than GNOME and has been developed in parallel ever since.\r\n\r\nSecurity Fix(es):\n\nA flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable. This vulnerability has an impact on confidentiality, integrity, and availability.(CVE-2026-1489)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"glib2","purl":"pkg:rpm/openEuler/glib2&distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.66.8-24.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["glib2-2.66.8-24.oe2003sp4.aarch64.rpm","glib2-debuginfo-2.66.8-24.oe2003sp4.aarch64.rpm","glib2-debugsource-2.66.8-24.oe2003sp4.aarch64.rpm","glib2-devel-2.66.8-24.oe2003sp4.aarch64.rpm"],"noarch":["glib2-help-2.66.8-24.oe2003sp4.noarch.rpm"],"src":["glib2-2.66.8-24.oe2003sp4.src.rpm"],"x86_64":["glib2-2.66.8-24.oe2003sp4.x86_64.rpm","glib2-debuginfo-2.66.8-24.oe2003sp4.x86_64.rpm","glib2-debugsource-2.66.8-24.oe2003sp4.x86_64.rpm","glib2-devel-2.66.8-24.oe2003sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1683"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-1489"}],"database_specific":{"severity":"Medium"}}
