OESA-2026-1765

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1765
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1765.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-1765
Upstream
Published
2026-03-27T14:07:38Z
Modified
2026-03-27T14:15:39.538786Z
Summary
glib2 security update
Details

GLib is a bundle of three (formerly five) low-level system libraries written in C and developed mainly by GNOME. GLib's code was separated from GTK, so it can be used by software other than GNOME and has been developed in parallel ever since.

Security Fix(es):

A flaw was found in GLib, which is vulnerable to an integer overflow in the gstringinsert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.(CVE-2025-4373)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / glib2

Package

Name
glib2
Purl
pkg:rpm/openEuler/glib2&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.66.8-24.oe2003sp4

Ecosystem specific

{
    "src": [
        "glib2-2.66.8-24.oe2003sp4.src.rpm"
    ],
    "aarch64": [
        "glib2-2.66.8-24.oe2003sp4.aarch64.rpm",
        "glib2-debuginfo-2.66.8-24.oe2003sp4.aarch64.rpm",
        "glib2-debugsource-2.66.8-24.oe2003sp4.aarch64.rpm",
        "glib2-devel-2.66.8-24.oe2003sp4.aarch64.rpm"
    ],
    "x86_64": [
        "glib2-2.66.8-24.oe2003sp4.x86_64.rpm",
        "glib2-debuginfo-2.66.8-24.oe2003sp4.x86_64.rpm",
        "glib2-debugsource-2.66.8-24.oe2003sp4.x86_64.rpm",
        "glib2-devel-2.66.8-24.oe2003sp4.x86_64.rpm"
    ],
    "noarch": [
        "glib2-help-2.66.8-24.oe2003sp4.noarch.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-1765.json"