{"affected":[{"ecosystem_specific":{"binaries":[{"glib2-devel":"2.48.2-12.52.1","glib2-devel-static":"2.48.2-12.52.1","glib2-lang":"2.48.2-12.52.1","glib2-tools":"2.48.2-12.52.1","libgio-2_0-0":"2.48.2-12.52.1","libgio-2_0-0-32bit":"2.48.2-12.52.1","libglib-2_0-0":"2.48.2-12.52.1","libglib-2_0-0-32bit":"2.48.2-12.52.1","libgmodule-2_0-0":"2.48.2-12.52.1","libgmodule-2_0-0-32bit":"2.48.2-12.52.1","libgobject-2_0-0":"2.48.2-12.52.1","libgobject-2_0-0-32bit":"2.48.2-12.52.1","libgthread-2_0-0":"2.48.2-12.52.1","libgthread-2_0-0-32bit":"2.48.2-12.52.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"glib2","purl":"pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.48.2-12.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glib2-devel":"2.48.2-12.52.1","glib2-devel-static":"2.48.2-12.52.1","glib2-lang":"2.48.2-12.52.1","glib2-tools":"2.48.2-12.52.1","libgio-2_0-0":"2.48.2-12.52.1","libgio-2_0-0-32bit":"2.48.2-12.52.1","libglib-2_0-0":"2.48.2-12.52.1","libglib-2_0-0-32bit":"2.48.2-12.52.1","libgmodule-2_0-0":"2.48.2-12.52.1","libgmodule-2_0-0-32bit":"2.48.2-12.52.1","libgobject-2_0-0":"2.48.2-12.52.1","libgobject-2_0-0-32bit":"2.48.2-12.52.1","libgthread-2_0-0":"2.48.2-12.52.1","libgthread-2_0-0-32bit":"2.48.2-12.52.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"glib2","purl":"pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.48.2-12.52.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glib2 fixes the following issues:\n\n- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote\n  filesystem attribute values can lead to denial-of-service (bsc#1254878).\n- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when\n  processing attacker-influenced data may lead to crash or code execution (bsc#1254662).\n- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a\n  large number of unacceptable characters may lead to crash or code execution (bsc#1254297).\n\n  ","id":"SUSE-SU-2025:4441-1","modified":"2025-12-17T16:15:21Z","published":"2025-12-17T16:15:21Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20254441-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254297"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254878"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-13601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-14087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-14512"}],"related":["CVE-2025-13601","CVE-2025-14087","CVE-2025-14512"],"summary":"Security update for glib2","upstream":["CVE-2025-13601","CVE-2025-14087","CVE-2025-14512"]}