[ALSA-2025:11327] Moderate: glib2 security update
Type:
security
Severity:
moderate
Release date:
2025-07-17
Description:
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib2: Signal subscription vulnerabilities (CVE-2024-34397) * glib: buffer overflow in set_connect_msg() (CVE-2024-52533) * glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 glib2-static-2.56.4-166.el8_10.aarch64.rpm 5662b73ff229d3190ff73b738311ca1b5e60a8823843933c4208228809925249
aarch64 glib2-2.56.4-166.el8_10.aarch64.rpm 776494bcaecaf261f77a23f769b228920e1a3bdae41e54e7dc1daade8a0ac34c
aarch64 glib2-devel-2.56.4-166.el8_10.aarch64.rpm 943666ae415e10fa425783fad33dd70dbe43d1fbbb57e7ae25bf636572ac9e17
aarch64 glib2-fam-2.56.4-166.el8_10.aarch64.rpm a1c1a40bb082de1a7fd87c12db992fe8a4c04f52c1c335973e1874e7c1d35e4c
aarch64 glib2-tests-2.56.4-166.el8_10.aarch64.rpm e17c102e7f6c7dbb4c895c272e553dcdbc4ec053491c52a1409a9a08e3b789d5
i686 glib2-static-2.56.4-166.el8_10.i686.rpm 2c830403fd6b47f4bb6174b791f2350c4fc41ed3d5141125de361f496d58df48
i686 glib2-devel-2.56.4-166.el8_10.i686.rpm 39330550b6181d858e7c4e3a9ee8e2ffbd4b8a10ddaed53c9cd78d705dbde952
i686 glib2-2.56.4-166.el8_10.i686.rpm 483e6877d9d295095c5fae749f2fe25655555a131e1a7b3011e8c45358586a4c
noarch glib2-doc-2.56.4-166.el8_10.noarch.rpm cd7b24af810ed5ff7814e409ed064913efea73f0690475989bc3286481715993
ppc64le glib2-devel-2.56.4-166.el8_10.ppc64le.rpm 6084739775c21e266007787ef2fe073c67e1293f575e9602b37f013ede371e10
ppc64le glib2-tests-2.56.4-166.el8_10.ppc64le.rpm 8ae68b184f21203e6d6376c83f369b3fb01c6fed10a92afbcd62bc7f9a963df5
ppc64le glib2-static-2.56.4-166.el8_10.ppc64le.rpm dfeb8696257cc3217f28f1dfc5b3997178480c61772485dcb1f33c1216d72e45
ppc64le glib2-2.56.4-166.el8_10.ppc64le.rpm e03269374151781d5d521863e6850216a9865eff0a3480da174f7add819cf8e6
ppc64le glib2-fam-2.56.4-166.el8_10.ppc64le.rpm e49957c5eff2aca8b8b774916134d93a0757e071dccf4a1dfd182fa169cd97ba
s390x glib2-devel-2.56.4-166.el8_10.s390x.rpm 276d78340192f3065541f307999ed5d1adcd5af6193c1c8e712a7a3e2c31cbf3
s390x glib2-fam-2.56.4-166.el8_10.s390x.rpm 3b206a57c568ebf3ac04b93d47b1317fd04fde3a12cc2bc57a10166eaecdbbce
s390x glib2-static-2.56.4-166.el8_10.s390x.rpm 71ab004475281fe80509092ca3c5ff13d41c458ca52a326020c2b32da5294cf8
s390x glib2-2.56.4-166.el8_10.s390x.rpm a99917e69513a858776aff965cfab925362191888cfcedcd952501c2d9e03ec2
s390x glib2-tests-2.56.4-166.el8_10.s390x.rpm efc70a2ab8f03b4bb0d6ae6453856f3df20e48e4746ea29bc014f7f1a2ad48c5
x86_64 glib2-tests-2.56.4-166.el8_10.x86_64.rpm 126323991fa32bc138317eb688c321d91f21ce2cd7239972fb97c1fafeb54b1f
x86_64 glib2-static-2.56.4-166.el8_10.x86_64.rpm 2a2ebbf9ddd03075132932023d097817e45b31a6864216ddea8e066d4c36a5a5
x86_64 glib2-fam-2.56.4-166.el8_10.x86_64.rpm 5c4b0ecf5db48948c0efd49d48599712384805fb5e11b4d3d90b8a1f72fb49e7
x86_64 glib2-devel-2.56.4-166.el8_10.x86_64.rpm a296b60419a511e505e30e969176fad72261385463aa5c911b2c45a1c3fe5af0
x86_64 glib2-2.56.4-166.el8_10.x86_64.rpm e4471e914c2c17827b5634bd71bbffa2ac01ca79b85d73196b4203f412e6f019
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.