[ALSA-2026:15969] Moderate: glib2 security update
Type:
security
Severity:
moderate
Release date:
2026-05-13
Description:
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: GLib: Buffer underflow in GVariant parser leads to heap corruption (CVE-2025-14087) * glib: Integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow (CVE-2025-14512) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 glib2-static-2.80.4-10.el10_1.13.aarch64.rpm 5493c36ca5b5e8b166e0a21a7bd94769166ccf33ef75b2aa441a5bc2fb8b802d
aarch64 glib2-devel-2.80.4-10.el10_1.13.aarch64.rpm 99b0e20d1b2feecfbb461803ee72b812f8f187acbe2ad15a9bfbd9f3c23a39d1
aarch64 glib2-2.80.4-10.el10_1.13.aarch64.rpm cadbe2fb099aec1038bf604383745b2e4aa0ca655c7ae5f26751b09705fb17ac
aarch64 glib2-tests-2.80.4-10.el10_1.13.aarch64.rpm d980305115e29f93c91c5a46c8fd3c350114b8e8748fb441e09ae82dfd0578da
aarch64 glib2-doc-2.80.4-10.el10_1.13.aarch64.rpm f720884267115d1e57a5cccbdf6c965d7f06e4f0aeffb118b092c6562486b298
ppc64le glib2-tests-2.80.4-10.el10_1.13.ppc64le.rpm 69bbf8adc9ea1b78913da9bf9f88411d3c96d0c10dce8828f07bef166d5721ba
ppc64le glib2-devel-2.80.4-10.el10_1.13.ppc64le.rpm 7abce62cfab9806f9129db7d043e25cd57d6b999203766aec08e6cd04867d807
ppc64le glib2-static-2.80.4-10.el10_1.13.ppc64le.rpm 90f5b74e4e10f22c8f97ca9fb2aba63be2e60b7984d0f16cf5a75c3bb826976c
ppc64le glib2-2.80.4-10.el10_1.13.ppc64le.rpm ba5f6e3af39dcea3dd41b4d2823db86f730f2bd55d787d4aceed86733942bcd1
ppc64le glib2-doc-2.80.4-10.el10_1.13.ppc64le.rpm e802458ddd9de09e7596f8c019cf3f64b30a9a235d2dd5a690d7e345369abf9a
s390x glib2-devel-2.80.4-10.el10_1.13.s390x.rpm 574fde764caed13e527204b47e03b95bf87f053ef2c3d682b5951ec6f7dcde92
s390x glib2-2.80.4-10.el10_1.13.s390x.rpm 5c18f6239960f87caff3cb20082f7575eec8044154b583a1e82d0b85457a200a
s390x glib2-static-2.80.4-10.el10_1.13.s390x.rpm 87422a602cda37aff7cc8ba2f95836a37721154a24e18ba981c7cf5ea8047a52
s390x glib2-doc-2.80.4-10.el10_1.13.s390x.rpm 8900be1b64a636f2dba54c262c9e68709acf109e656c8cfb96cf5f01b014b14c
s390x glib2-tests-2.80.4-10.el10_1.13.s390x.rpm 8acf02466675325ae8d6eeba336b7b9e99f88db89e865322c7cc1dc648126673
x86_64 glib2-devel-2.80.4-10.el10_1.13.x86_64.rpm 0b4061e5b50cdbe89b2f1507350b97f372cfe90c2a08f616a50db8ef345ffb99
x86_64 glib2-tests-2.80.4-10.el10_1.13.x86_64.rpm 7c93ca348f5f7675848cdb9c1d462b60d73c2a1dd92550cec034268682d7e970
x86_64 glib2-static-2.80.4-10.el10_1.13.x86_64.rpm ccb6b266b6a01dc1fa15942d5190a42a335d689215999201b89db024637e9439
x86_64 glib2-2.80.4-10.el10_1.13.x86_64.rpm d333c20fb2baee7381da29b227b6313508ded994791d92b39155af11f9b5dc9f
x86_64 glib2-doc-2.80.4-10.el10_1.13.x86_64.rpm ed63791c0c68e1b0daa004598dabce3997d28b26564ac1b54c403cef7de4b679
x86_64_v2 glib2-2.80.4-10.el10_1.13.x86_64_v2.rpm 2b5b01db7a09f730a045554c8e4a16b15ac4c0d7469084d7d92f761e456151f0
x86_64_v2 glib2-devel-2.80.4-10.el10_1.13.x86_64_v2.rpm 3836da98f9fbe25da09c0110cf4c302f8defe251ecfc825aa57e848c7c007fe9
x86_64_v2 glib2-static-2.80.4-10.el10_1.13.x86_64_v2.rpm 47baada0c78221480d23b79e81ec5278ae6536302e7a593af41b50868b7275a9
x86_64_v2 glib2-tests-2.80.4-10.el10_1.13.x86_64_v2.rpm 864982039469fc713687a4298c5222502870bd1b45d1029fc3e815d36b3940fc
x86_64_v2 glib2-doc-2.80.4-10.el10_1.13.x86_64_v2.rpm ec5441dba992b8b631e03aa76dd672ee65fc0cb9dbb1bc11f00017d6512a7984
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.