{"affected":[{"ecosystem_specific":{"binaries":[{"glib2-tools":"2.76.2-9.1","libgio-2_0-0":"2.76.2-9.1","libglib-2_0-0":"2.76.2-9.1","libgmodule-2_0-0":"2.76.2-9.1","libgobject-2_0-0":"2.76.2-9.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"glib2","purl":"pkg:rpm/suse/glib2&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.76.2-9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glib2 fixes the following issues:\n\n- CVE-2025-4373: Fixed buffer underflow through glib/gstring.c via \n  function g_string_insert_unichar (bsc#1242844)\n- CVE-2025-6052: Fixed integer overflow in g_string_maybe_expand() \n  leads to potential buffer overflow in GString (bsc#1244596)\n","id":"SUSE-SU-2025:20508-1","modified":"2025-07-24T11:51:08Z","published":"2025-07-24T11:51:08Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520508-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242844"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244596"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-4373"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-6052"}],"related":["CVE-2025-4373","CVE-2025-6052"],"summary":"Security update for glib2","upstream":["CVE-2025-4373","CVE-2025-6052"]}