<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for glib2 is now available for openEuler-20.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-1683</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-03-20</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-03-20</InitialReleaseDate>
		<CurrentReleaseDate>2026-03-20</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-03-20</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">glib2 security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for glib2 is now available for openEuler-20.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">GLib is a bundle of three (formerly five) low-level system libraries written in C and developed mainly by GNOME. GLib&amp;apos;s code was separated from GTK, so it can be used by software other than GNOME and has been developed in parallel ever since.

Security Fix(es):

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable. This vulnerability has an impact on confidentiality, integrity, and availability.(CVE-2026-1489)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for glib2 is now available for master/openEuler-20.03-LTS-SP4/openEuler-22.03-LTS-SP4/openEuler-24.03-LTS/openEuler-24.03-LTS-Next/openEuler-24.03-LTS-SP1/openEuler-24.03-LTS-SP2/openEuler-24.03-LTS-SP3.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">glib2</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1683</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-1489</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-1489</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="glib2-2.66.8-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">glib2-2.66.8-24.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debuginfo-2.66.8-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">glib2-debuginfo-2.66.8-24.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debugsource-2.66.8-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">glib2-debugsource-2.66.8-24.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="glib2-devel-2.66.8-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">glib2-devel-2.66.8-24.oe2003sp4.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="glib2-help-2.66.8-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">glib2-help-2.66.8-24.oe2003sp4.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="glib2-2.66.8-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">glib2-2.66.8-24.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debuginfo-2.66.8-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">glib2-debuginfo-2.66.8-24.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-debugsource-2.66.8-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">glib2-debugsource-2.66.8-24.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="glib2-devel-2.66.8-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">glib2-devel-2.66.8-24.oe2003sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="glib2-2.66.8-24" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">glib2-2.66.8-24.oe2003sp4.src.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable. This vulnerability has an impact on confidentiality, integrity, and availability.</Note>
		</Notes>
		<ReleaseDate>2026-03-20</ReleaseDate>
		<CVE>CVE-2026-1489</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.4</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>glib2 security update</Description>
				<DATE>2026-03-20</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1683</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>