Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-13601 (GCVE-0-2025-13601)
Vulnerability from cvelistv5 – Published: 2025-11-26 14:44 – Updated: 2026-02-19 01:07- CWE-190 - Integer Overflow or Wraparound
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Affected:
0 , < 2.86.3
(semver)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-13601",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-26T14:58:08.094570Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-26T15:02:42.504Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://gitlab.gnome.org/GNOME/glib/",
"defaultStatus": "unaffected",
"packageName": "glib",
"versions": [
{
"lessThan": "2.86.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.1"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.80.4-10.el10_1.12",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux_eus:10.0"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 10.0 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.80.4-4.el10_0.8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_els:7"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.56.1-11.el7_9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.56.4-168.el8_10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_aus:8.2::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 8.2 Advanced Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.56.4-8.el8_2.4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_eus_long_life:8.4::baseos",
"cpe:/o:redhat:rhel_aus:8.4::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.56.4-10.el8_4.4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_eus_long_life:8.4::baseos",
"cpe:/o:redhat:rhel_aus:8.4::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.56.4-10.el8_4.4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.56.4-158.el8_6.4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.56.4-158.el8_6.4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.56.4-158.el8_6.4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_e4s:8.8::baseos",
"cpe:/o:redhat:rhel_tus:8.8::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.56.4-164.el8_8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_e4s:8.8::baseos",
"cpe:/o:redhat:rhel_tus:8.8::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.56.4-164.el8_8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.68.4-18.el9_7.1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.68.4-18.el9_7.1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.68.4-5.el9_0.4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:9.2::appstream",
"cpe:/o:redhat:rhel_e4s:9.2::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.68.4-7.el9_2.4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 9.4 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.68.4-14.el9_4.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:9.6::appstream",
"cpe:/o:redhat:rhel_eus:9.6::baseos",
"cpe:/a:redhat:rhel_eus:9.6::crb"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 9.6 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.68.4-16.el9_6.4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.12::el8"
],
"defaultStatus": "affected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.12",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "412.86.202602021310-0",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.16::el9"
],
"defaultStatus": "affected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.16",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "416.94.202602101357-0",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.17::el9"
],
"defaultStatus": "affected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.17",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "417.94.202602090846-0",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.18::el9"
],
"defaultStatus": "affected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.18",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "418.94.202602022246-0",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.19::el9"
],
"defaultStatus": "affected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.19",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "9.6.20260211-0",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:ceph_storage:8::el9"
],
"defaultStatus": "affected",
"packageName": "rhceph/rhceph-8-rhel9",
"product": "Red Hat Ceph Storage 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:discovery:2::el9"
],
"defaultStatus": "affected",
"packageName": "discovery/discovery-server-rhel9",
"product": "Red Hat Discovery 2",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:discovery:2::el9"
],
"defaultStatus": "affected",
"packageName": "discovery/discovery-ui-rhel9",
"product": "Red Hat Discovery 2",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:insights_proxy:1.5::el9"
],
"defaultStatus": "affected",
"packageName": "insights-proxy/insights-proxy-container-rhel9",
"product": "Red Hat Insights proxy 1.5",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:rhui:5::el9"
],
"defaultStatus": "affected",
"packageName": "rhui5/cds-rhel9",
"product": "Red Hat Update Infrastructure 5",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:rhui:5::el9"
],
"defaultStatus": "affected",
"packageName": "rhui5/haproxy-rhel9",
"product": "Red Hat Update Infrastructure 5",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:rhui:5::el9"
],
"defaultStatus": "affected",
"packageName": "rhui5/installer-rhel9",
"product": "Red Hat Update Infrastructure 5",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:rhui:5::el9"
],
"defaultStatus": "affected",
"packageName": "rhui5/rhua-rhel9",
"product": "Red Hat Update Infrastructure 5",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "affected",
"packageName": "mingw-glib2",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unknown",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "affected",
"packageName": "mingw-glib2",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "affected",
"packageName": "mingw-glib2",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
}
],
"datePublic": "2025-11-24T13:00:15.295Z",
"descriptions": [
{
"lang": "en",
"value": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Moderate"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-190",
"description": "Integer Overflow or Wraparound",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-19T01:07:34.125Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2026:0936",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:0936"
},
{
"name": "RHSA-2026:0975",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:0975"
},
{
"name": "RHSA-2026:0991",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:0991"
},
{
"name": "RHSA-2026:1323",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1323"
},
{
"name": "RHSA-2026:1324",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1324"
},
{
"name": "RHSA-2026:1326",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1326"
},
{
"name": "RHSA-2026:1327",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1327"
},
{
"name": "RHSA-2026:1465",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1465"
},
{
"name": "RHSA-2026:1608",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1608"
},
{
"name": "RHSA-2026:1624",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1624"
},
{
"name": "RHSA-2026:1625",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1625"
},
{
"name": "RHSA-2026:1626",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1626"
},
{
"name": "RHSA-2026:1627",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1627"
},
{
"name": "RHSA-2026:1652",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"name": "RHSA-2026:1736",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"name": "RHSA-2026:2064",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2064"
},
{
"name": "RHSA-2026:2072",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2072"
},
{
"name": "RHSA-2026:2485",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"name": "RHSA-2026:2563",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"name": "RHSA-2026:2633",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2633"
},
{
"name": "RHSA-2026:2659",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2659"
},
{
"name": "RHSA-2026:2671",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2671"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"name": "RHBZ#2416741",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-11-24T12:49:28.274Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2025-11-24T13:00:15.295Z",
"value": "Made public."
}
],
"title": "Glib: integer overflow in in g_escape_uri_string()",
"workarounds": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
},
"x_redhatCweChain": "CWE-190: Integer Overflow or Wraparound"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-13601",
"datePublished": "2025-11-26T14:44:22.680Z",
"dateReserved": "2025-11-24T12:54:51.473Z",
"dateUpdated": "2026-02-19T01:07:34.125Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-13601\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-11-26T15:15:51.723\",\"lastModified\":\"2026-02-19T07:17:31.273\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder:9.0:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"7905C85D-4663-4485-99C1-202F4A7D6EBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA3C5EAE-267F-410F-8AFA-8F5B68A9E617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B3D7389-35C1-48C4-A9EC-2564842723C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D70C7263-C24B-4090-9E44-0E0CFD2294A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"1810D5FB-1AB2-4861-A671-CA548C2FFDC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB056B47-1F45-4CE4-81F6-872F66C24C29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E07C1C58-0E5F-4B56-9B8D-5DE67DB00F79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE296A4-202C-41AF-92AB-AC0672EAFA90\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:10.0:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"EF8B4882-78F7-4DC5-BF80-983143DA0155\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:10.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA2DB6C0-E18E-492A-B517-4020A7FB049A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:10.0_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FAC9D08-6D5C-443D-99C7-6FD20AF83523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D791EEA5-68D1-41E0-A53D-8EBB9C6CF873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:10.0:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"18873769-C951-42F2-A98B-761652148F59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:10.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8492E227-C09E-4F51-8EAF-0F7BCCD41A16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:10.0_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FABD546-0E45-4A65-A2E5-50EC62B852E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4D6060-0C13-4976-A366-C4655367AA78\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:8.0:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"C70933CB-B915-4792-902B-CC858829D208\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55CF7208-4D36-4C35-92BC-F6EA2C8DEDE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F791F846-7762-40E0-9056-032FD10F2046\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F967F2F2-9B99-46D3-A092-F7AE41F5D5B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"73F3D9DA-CEFB-471B-85A2-8652D37D7F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32AF225E-94C0-4D07-900C-DD868C05F554\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23D471AC-7DCA-4425-AD91-E5D928753A8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97104CED-E93B-49CE-81F8-810AF2A8A392\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"4ACBFE13-EF28-48EC-ACDC-AC3159C2AB67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E068ABB-31C2-416E-974A-95E07A2BAB0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.2_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED521457-498F-4E43-B714-9A3F2C3CD09A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66DA6342-8316-4961-9C2A-01D6DC51446A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F32CA554-F9D7-425B-8F1C-89678507F28C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"80A262F1-B05B-43BA-ABB2-0FDE68C16A8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E1C5656-6A78-4DCD-A369-76DFD61618E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.4_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0002CB3-8004-4927-A92C-E7C1F83322E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4B9984-698D-4A60-AB6C-3B4CCDD9697F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"8B79BA89-CB0F-4153-9692-AA9BEA765076\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"069180B4-BA50-4AD0-8BA9-83F8005E58BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.4_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53EBD3B7-D31D-46A5-BDFA-178FDF79C776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A75E10C3-AA3F-43CD-AB14-16754619B48D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5EF3CEF-62CF-4860-8301-4154D2407236\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39D345D3-108A-4551-A112-5EE51991411A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:9.4_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"212A3822-46F7-4144-B875-349452A93F73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24105826-EBD2-4029-978B-B7176343C09C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:10.0:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"C1FC4688-EE61-40B0-B36C-5B40A54FEB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:10.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E6DF379-2929-4F2B-A3F7-D32EF0A634B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:10.0_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B04B55-C375-4A04-88B6-307B5121538D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64_eus:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AEA15D8-8BE8-4D4A-97C3-5F237CAB18DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:10.0:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"FC6F6213-7AE9-4454-B3CB-8AD6999C733E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:10.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D8456B7-F13F-4E74-B610-F1301B738A6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:10.0_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D490B-E674-4957-BD84-B0615A06FBF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ECE154D-05A8-43F6-AAEB-9EF460B3A721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:10.0_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50CBF587-5E49-41B8-803E-3020142FF1A6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.6:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"9B58B337-8F7B-4812-91BF-F26044EDF603\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.6_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4A892AD-1CB2-42AC-B163-DB34613D8AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.6_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC8564CF-FCAC-48AE-AE11-4AB7068197BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"241FE2FA-8B22-4878-B30A-81ABEFD29C2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.6:*:*:*:*:*:aarch64:*\",\"matchCriteriaId\":\"8E3BC071-331C-40FF-911C-699B83C9E874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.6_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D284FF58-5ED8-4F0F-80BA-4E677256994A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.6_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F38D24-E400-42E8-BBD3-CA44CE414D54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.6_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0516993E-CBD5-44F1-8684-7172C9ABFD0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF644CC-8CDF-4C0C-B40C-80106A479B58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7254B894-CFCB-4599-8228-A3DD7C996489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FDD919E-B7FE-4EC5-8D6B-EC9A4723D6E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:9.6_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA517DC-CC2E-4F71-A753-3611747C2B03\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C04BCAC6-85B4-45C3-9591-B8A3B95E0682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF4865A7-DD37-45C0-839E-AA07F47DD44F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C24D94-834A-4E9D-8F73-624AFA99AAA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:8.6_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5ACFD7D-558D-4E72-824B-3C890BE76086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1272DF03-7674-4BD4-8E64-94004B195448\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7692F48F-F14D-452A-B145-761A28A65063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"439D3548-E194-4A99-8E39-EC1A7B1C0BAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:8.8_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F10F1F-5DA7-49FF-A8A7-524251699323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1CA946D-1665-4874-9D41-C7D963DD1F56\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A50F79DB-13DE-4725-962D-9487256F03EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28F226A-CBC7-4A32-BE58-398FA5B42481\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6897676D-53F9-45B3-B27F-7FF9A4C58D33\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ceph_storage:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52AE9D9D-5D74-4AB8-8FF9-5CEA2A1A97B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:discovery:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46C0E53D-07D5-48BF-8749-637DACF255A5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.86.3\",\"matchCriteriaId\":\"890566A0-619C-42E2-BD1D-9EFAC63E68F4\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2026:0936\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:0975\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:0991\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1323\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1324\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1326\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1327\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1465\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1608\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1624\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1625\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1626\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1627\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1652\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:1736\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2064\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2072\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2485\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2563\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2633\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2659\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2671\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-13601\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2416741\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.gnome.org/GNOME/glib/-/issues/3827\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-13601\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-11-26T14:58:08.094570Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-11-26T14:58:11.050Z\"}}], \"cna\": {\"title\": \"Glib: integer overflow in in g_escape_uri_string()\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2.86.3\", \"versionType\": \"semver\"}], \"packageName\": \"glib\", \"collectionURL\": \"https://gitlab.gnome.org/GNOME/glib/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.80.4-10.el10_1.12\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux_eus:10.0\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10.0 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.80.4-4.el10_0.8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_els:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7 Extended Lifecycle Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.56.1-11.el7_9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::crb\", \"cpe:/o:redhat:enterprise_linux:8::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.56.4-168.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_aus:8.2::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Advanced Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.56.4-8.el8_2.4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_eus_long_life:8.4::baseos\", \"cpe:/o:redhat:rhel_aus:8.4::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.56.4-10.el8_4.4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_eus_long_life:8.4::baseos\", \"cpe:/o:redhat:rhel_aus:8.4::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.56.4-10.el8_4.4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_tus:8.6::baseos\", \"cpe:/o:redhat:rhel_e4s:8.6::baseos\", \"cpe:/o:redhat:rhel_aus:8.6::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.56.4-158.el8_6.4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_tus:8.6::baseos\", \"cpe:/o:redhat:rhel_e4s:8.6::baseos\", \"cpe:/o:redhat:rhel_aus:8.6::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.56.4-158.el8_6.4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_tus:8.6::baseos\", \"cpe:/o:redhat:rhel_e4s:8.6::baseos\", \"cpe:/o:redhat:rhel_aus:8.6::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.56.4-158.el8_6.4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_e4s:8.8::baseos\", \"cpe:/o:redhat:rhel_tus:8.8::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.8 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.56.4-164.el8_8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_e4s:8.8::baseos\", \"cpe:/o:redhat:rhel_tus:8.8::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.56.4-164.el8_8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::baseos\", \"cpe:/a:redhat:enterprise_linux:9::crb\", \"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.68.4-18.el9_7.1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::baseos\", \"cpe:/a:redhat:enterprise_linux:9::crb\", \"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.68.4-18.el9_7.1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_e4s:9.0::baseos\", \"cpe:/a:redhat:rhel_e4s:9.0::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.68.4-5.el9_0.4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:9.2::appstream\", \"cpe:/o:redhat:rhel_e4s:9.2::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.68.4-7.el9_2.4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.4::crb\", \"cpe:/a:redhat:rhel_eus:9.4::appstream\", \"cpe:/o:redhat:rhel_eus:9.4::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.4 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.68.4-14.el9_4.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_eus:9.6::baseos\", \"cpe:/a:redhat:rhel_eus:9.6::crb\", \"cpe:/a:redhat:rhel_eus:9.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.6 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.68.4-16.el9_6.4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4.12::el8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4.12\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"412.86.202602021310-0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4.16::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4.16\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"416.94.202602101357-0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4.18::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4.18\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"418.94.202602022246-0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:ceph_storage:8::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Ceph Storage 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhceph/rhceph-8-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:discovery:2::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Discovery 2\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"discovery/discovery-server-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:discovery:2::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Discovery 2\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"discovery/discovery-ui-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:insights_proxy:1.5::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Insights proxy 1.5\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"insights-proxy/insights-proxy-container-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhui:5::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Update Infrastructure 5\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhui5/cds-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhui:5::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Update Infrastructure 5\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhui5/haproxy-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhui:5::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Update Infrastructure 5\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhui5/installer-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhui:5::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Update Infrastructure 5\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhui5/rhua-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"mingw-glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"mingw-glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"packageName\": \"mingw-glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-11-24T12:49:28.274Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-11-24T13:00:15.295Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-11-24T13:00:15.295Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2026:0936\", \"name\": \"RHSA-2026:0936\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:0975\", \"name\": \"RHSA-2026:0975\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:0991\", \"name\": \"RHSA-2026:0991\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1323\", \"name\": \"RHSA-2026:1323\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1324\", \"name\": \"RHSA-2026:1324\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1326\", \"name\": \"RHSA-2026:1326\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1327\", \"name\": \"RHSA-2026:1327\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1465\", \"name\": \"RHSA-2026:1465\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1608\", \"name\": \"RHSA-2026:1608\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1624\", \"name\": \"RHSA-2026:1624\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1625\", \"name\": \"RHSA-2026:1625\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1626\", \"name\": \"RHSA-2026:1626\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1627\", \"name\": \"RHSA-2026:1627\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1652\", \"name\": \"RHSA-2026:1652\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:1736\", \"name\": \"RHSA-2026:1736\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:2064\", \"name\": \"RHSA-2026:2064\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:2072\", \"name\": \"RHSA-2026:2072\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:2485\", \"name\": \"RHSA-2026:2485\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:2563\", \"name\": \"RHSA-2026:2563\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:2659\", \"name\": \"RHSA-2026:2659\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-13601\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2416741\", \"name\": \"RHBZ#2416741\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://gitlab.gnome.org/GNOME/glib/-/issues/3827\"}, {\"url\": \"https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-190\", \"description\": \"Integer Overflow or Wraparound\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2026-02-18T19:37:35.772Z\"}, \"x_redhatCweChain\": \"CWE-190: Integer Overflow or Wraparound\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-13601\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-18T19:37:35.772Z\", \"dateReserved\": \"2025-11-24T12:54:51.473Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-11-26T14:44:22.680Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2026-AVI-0112
Vulnerability from certfr_avis - Published: 2026-02-02 - Updated: 2026-02-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.1.7 | ||
| VMware | Tanzu Kubernetes Grid Integrated Edition | Tanzu Kubernetes Grid Integrated Edition (TKGi) - Mgmt Console versions antérieures à 1.24.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.7+LTS-T | ||
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.74 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.2.3 | ||
| VMware | Tanzu Platform | Telemetry pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | N/A | Platform Automation Toolkit versions antérieures à 5.4.0 | ||
| VMware | N/A | VMware Harbor Registry versions antérieures à 2.14.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.4 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.7",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Kubernetes Grid Integrated Edition (TKGi) - Mgmt Console versions ant\u00e9rieures \u00e0 1.24.0",
"product": {
"name": "Tanzu Kubernetes Grid Integrated Edition",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.7+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.74",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.3",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Harbor Registry versions ant\u00e9rieures \u00e0 2.14.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2026-24882",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24882"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2022-49390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49390"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-14762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14762"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2026-24883",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24883"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-6966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6966"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2024-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53218"
},
{
"name": "CVE-2025-67499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67499"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-11413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11413"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2024-53090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53090"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-23419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23419"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2024-50067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
},
{
"name": "CVE-2024-47220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47220"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2026-24881",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24881"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-47691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47691"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
}
],
"initial_release_date": "2026-02-02T00:00:00",
"last_revision_date": "2026-02-02T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0112",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36902",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36902"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36908",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36908"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36897",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36897"
},
{
"published_at": "2026-02-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36912",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36912"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36904",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36904"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36900",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36900"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36903",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36903"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36909",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36909"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36899",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36899"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36906",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36906"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36907",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36907"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36901",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36901"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36905",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36905"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36898",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36898"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36910",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36910"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36911",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36911"
}
]
}
CERTFR-2025-AVI-1064
Vulnerability from certfr_avis - Published: 2025-12-04 - Updated: 2025-12-04
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 cups 2.3.3op2-10 | ||
| Microsoft | N/A | cbl2 grub2 2.06-15 | ||
| Microsoft | N/A | cbl2 nodejs18 18.20.3-9 | ||
| Microsoft | N/A | cbl2 fluent-bit versions antérieures à 3.0.6-5 | ||
| Microsoft | N/A | azl3 kernel versions antérieures à 6.6.117.1-1 | ||
| Microsoft | N/A | azl3 kubevirt 1.5.0-5 | ||
| Microsoft | N/A | cbl2 python-tensorboard 2.11.0-3 | ||
| Microsoft | N/A | azl3 nodejs 20.14.0-9 | ||
| Microsoft | N/A | azl3 glib versions antérieures à 2.78.6-5 | ||
| Microsoft | N/A | azl3 grub2 2.06-25 | ||
| Microsoft | N/A | azl3 libxslt 1.1.43-1 | ||
| Microsoft | N/A | azl3 expat 2.6.4-2 | ||
| Microsoft | N/A | azl3 python-tensorboard 2.16.2-6 | ||
| Microsoft | N/A | cbl2 rsync versions antérieures à 3.4.1-2 | ||
| Microsoft | N/A | cbl2 libxslt 1.1.34-8 | ||
| Microsoft | N/A | azl3 cups 2.4.13-1 | ||
| Microsoft | N/A | cbl2 haproxy versions antérieures à 2.4.24-2 | ||
| Microsoft | N/A | cbl2 kernel 5.15.186.1-1 | ||
| Microsoft | N/A | azl3 libpng versions antérieures à 1.6.51-1 | ||
| Microsoft | N/A | azl3 haproxy versions antérieures à 2.9.11-4 | ||
| Microsoft | N/A | azl3 tensorflow 2.16.1-9 | ||
| Microsoft | N/A | azl3 fluent-bit 3.1.9-6 | ||
| Microsoft | N/A | azl3 rsync versions antérieures à 3.4.1-2 | ||
| Microsoft | N/A | azl3 keras 3.3.3-5 | ||
| Microsoft | N/A | cbl2 libpng versions antérieures à 1.6.51-1 | ||
| Microsoft | N/A | cbl2 glib versions antérieures à 2.71.0-8 | ||
| Microsoft | N/A | cbl2 kubevirt versions antérieures à 0.59.0-31 | ||
| Microsoft | N/A | azl3 libvirt versions antérieures à 10.0.0-6 | ||
| Microsoft | N/A | cbl2 reaper 3.1.1-19 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 cups 2.3.3op2-10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 grub2 2.06-15",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 nodejs18 18.20.3-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 fluent-bit versions ant\u00e9rieures \u00e0 3.0.6-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel versions ant\u00e9rieures \u00e0 6.6.117.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kubevirt 1.5.0-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 nodejs 20.14.0-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 glib versions ant\u00e9rieures \u00e0 2.78.6-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 grub2 2.06-25",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libxslt 1.1.43-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 expat 2.6.4-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 rsync versions ant\u00e9rieures \u00e0 3.4.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libxslt 1.1.34-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 cups 2.4.13-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 haproxy versions ant\u00e9rieures \u00e0 2.4.24-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kernel 5.15.186.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libpng versions ant\u00e9rieures \u00e0 1.6.51-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 haproxy versions ant\u00e9rieures \u00e0 2.9.11-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 fluent-bit 3.1.9-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 rsync versions ant\u00e9rieures \u00e0 3.4.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 keras 3.3.3-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libpng versions ant\u00e9rieures \u00e0 1.6.51-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 glib versions ant\u00e9rieures \u00e0 2.71.0-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kubevirt versions ant\u00e9rieures \u00e0 0.59.0-31",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libvirt versions ant\u00e9rieures \u00e0 10.0.0-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 reaper 3.1.1-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-58436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58436"
},
{
"name": "CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2025-13226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13226"
},
{
"name": "CVE-2025-13193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13193"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2025-61915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61915"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"name": "CVE-2025-12977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12977"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-12970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12970"
},
{
"name": "CVE-2025-12638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12638"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-38656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38656"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-66030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66030"
},
{
"name": "CVE-2025-64704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64704"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-64713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64713"
},
{
"name": "CVE-2025-66221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66221"
},
{
"name": "CVE-2025-13230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13230"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-13227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13227"
},
{
"name": "CVE-2025-64324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64324"
},
{
"name": "CVE-2025-12969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12969"
},
{
"name": "CVE-2025-11230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11230"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2022-50233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50233"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
}
],
"initial_release_date": "2025-12-04T00:00:00",
"last_revision_date": "2025-12-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1064",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61661",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61661"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13230"
},
{
"published_at": "2025-11-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40210",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40210"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13227",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13227"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61915",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61915"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64720"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12816",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12816"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64704",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64704"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-54770",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54770"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11731",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11731"
},
{
"published_at": "2025-12-03",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66221",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66221"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13601",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13601"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64713",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64713"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-65018",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65018"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66030",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66030"
},
{
"published_at": "2025-11-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40211",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40211"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50233",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50233"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66382",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66382"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61664",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61664"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58436",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58436"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13193",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13193"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61662",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61662"
},
{
"published_at": "2025-11-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-38656",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38656"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11230"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-54771",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54771"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13226",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13226"
},
{
"published_at": "2025-12-03",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12638",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12638"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12970",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12970"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66031",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66031"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12977",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12977"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61663",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61663"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12969"
},
{
"published_at": "2025-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64324",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64324"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64506",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64506"
},
{
"published_at": "2025-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-10158",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10158"
},
{
"published_at": "2025-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64505",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64505"
}
]
}
CERTFR-2025-AVI-1064
Vulnerability from certfr_avis - Published: 2025-12-04 - Updated: 2025-12-04
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 cups 2.3.3op2-10 | ||
| Microsoft | N/A | cbl2 grub2 2.06-15 | ||
| Microsoft | N/A | cbl2 nodejs18 18.20.3-9 | ||
| Microsoft | N/A | cbl2 fluent-bit versions antérieures à 3.0.6-5 | ||
| Microsoft | N/A | azl3 kernel versions antérieures à 6.6.117.1-1 | ||
| Microsoft | N/A | azl3 kubevirt 1.5.0-5 | ||
| Microsoft | N/A | cbl2 python-tensorboard 2.11.0-3 | ||
| Microsoft | N/A | azl3 nodejs 20.14.0-9 | ||
| Microsoft | N/A | azl3 glib versions antérieures à 2.78.6-5 | ||
| Microsoft | N/A | azl3 grub2 2.06-25 | ||
| Microsoft | N/A | azl3 libxslt 1.1.43-1 | ||
| Microsoft | N/A | azl3 expat 2.6.4-2 | ||
| Microsoft | N/A | azl3 python-tensorboard 2.16.2-6 | ||
| Microsoft | N/A | cbl2 rsync versions antérieures à 3.4.1-2 | ||
| Microsoft | N/A | cbl2 libxslt 1.1.34-8 | ||
| Microsoft | N/A | azl3 cups 2.4.13-1 | ||
| Microsoft | N/A | cbl2 haproxy versions antérieures à 2.4.24-2 | ||
| Microsoft | N/A | cbl2 kernel 5.15.186.1-1 | ||
| Microsoft | N/A | azl3 libpng versions antérieures à 1.6.51-1 | ||
| Microsoft | N/A | azl3 haproxy versions antérieures à 2.9.11-4 | ||
| Microsoft | N/A | azl3 tensorflow 2.16.1-9 | ||
| Microsoft | N/A | azl3 fluent-bit 3.1.9-6 | ||
| Microsoft | N/A | azl3 rsync versions antérieures à 3.4.1-2 | ||
| Microsoft | N/A | azl3 keras 3.3.3-5 | ||
| Microsoft | N/A | cbl2 libpng versions antérieures à 1.6.51-1 | ||
| Microsoft | N/A | cbl2 glib versions antérieures à 2.71.0-8 | ||
| Microsoft | N/A | cbl2 kubevirt versions antérieures à 0.59.0-31 | ||
| Microsoft | N/A | azl3 libvirt versions antérieures à 10.0.0-6 | ||
| Microsoft | N/A | cbl2 reaper 3.1.1-19 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 cups 2.3.3op2-10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 grub2 2.06-15",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 nodejs18 18.20.3-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 fluent-bit versions ant\u00e9rieures \u00e0 3.0.6-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel versions ant\u00e9rieures \u00e0 6.6.117.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kubevirt 1.5.0-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 nodejs 20.14.0-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 glib versions ant\u00e9rieures \u00e0 2.78.6-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 grub2 2.06-25",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libxslt 1.1.43-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 expat 2.6.4-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 rsync versions ant\u00e9rieures \u00e0 3.4.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libxslt 1.1.34-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 cups 2.4.13-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 haproxy versions ant\u00e9rieures \u00e0 2.4.24-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kernel 5.15.186.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libpng versions ant\u00e9rieures \u00e0 1.6.51-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 haproxy versions ant\u00e9rieures \u00e0 2.9.11-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 fluent-bit 3.1.9-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 rsync versions ant\u00e9rieures \u00e0 3.4.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 keras 3.3.3-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libpng versions ant\u00e9rieures \u00e0 1.6.51-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 glib versions ant\u00e9rieures \u00e0 2.71.0-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kubevirt versions ant\u00e9rieures \u00e0 0.59.0-31",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libvirt versions ant\u00e9rieures \u00e0 10.0.0-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 reaper 3.1.1-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-58436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58436"
},
{
"name": "CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2025-13226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13226"
},
{
"name": "CVE-2025-13193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13193"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2025-61915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61915"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"name": "CVE-2025-12977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12977"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-12970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12970"
},
{
"name": "CVE-2025-12638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12638"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-38656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38656"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-66030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66030"
},
{
"name": "CVE-2025-64704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64704"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-64713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64713"
},
{
"name": "CVE-2025-66221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66221"
},
{
"name": "CVE-2025-13230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13230"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-13227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13227"
},
{
"name": "CVE-2025-64324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64324"
},
{
"name": "CVE-2025-12969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12969"
},
{
"name": "CVE-2025-11230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11230"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2022-50233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50233"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
}
],
"initial_release_date": "2025-12-04T00:00:00",
"last_revision_date": "2025-12-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1064",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61661",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61661"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13230"
},
{
"published_at": "2025-11-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40210",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40210"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13227",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13227"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61915",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61915"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64720"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12816",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12816"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64704",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64704"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-54770",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54770"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11731",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11731"
},
{
"published_at": "2025-12-03",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66221",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66221"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13601",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13601"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64713",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64713"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-65018",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65018"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66030",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66030"
},
{
"published_at": "2025-11-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40211",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40211"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50233",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50233"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66382",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66382"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61664",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61664"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58436",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58436"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13193",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13193"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61662",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61662"
},
{
"published_at": "2025-11-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-38656",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38656"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11230"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-54771",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54771"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13226",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13226"
},
{
"published_at": "2025-12-03",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12638",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12638"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12970",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12970"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66031",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66031"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12977",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12977"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61663",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61663"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12969"
},
{
"published_at": "2025-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64324",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64324"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64506",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64506"
},
{
"published_at": "2025-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-10158",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10158"
},
{
"published_at": "2025-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64505",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64505"
}
]
}
CERTFR-2026-AVI-0112
Vulnerability from certfr_avis - Published: 2026-02-02 - Updated: 2026-02-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.1.7 | ||
| VMware | Tanzu Kubernetes Grid Integrated Edition | Tanzu Kubernetes Grid Integrated Edition (TKGi) - Mgmt Console versions antérieures à 1.24.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.7+LTS-T | ||
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.74 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.2.3 | ||
| VMware | Tanzu Platform | Telemetry pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | N/A | Platform Automation Toolkit versions antérieures à 5.4.0 | ||
| VMware | N/A | VMware Harbor Registry versions antérieures à 2.14.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.4 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.7",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Kubernetes Grid Integrated Edition (TKGi) - Mgmt Console versions ant\u00e9rieures \u00e0 1.24.0",
"product": {
"name": "Tanzu Kubernetes Grid Integrated Edition",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.7+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.74",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.3",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Harbor Registry versions ant\u00e9rieures \u00e0 2.14.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2026-24882",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24882"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2022-49390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49390"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-14762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14762"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2026-24883",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24883"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-6966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6966"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2024-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53218"
},
{
"name": "CVE-2025-67499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67499"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-11413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11413"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2024-53090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53090"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-23419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23419"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2024-50067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
},
{
"name": "CVE-2024-47220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47220"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2026-24881",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24881"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-47691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47691"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
}
],
"initial_release_date": "2026-02-02T00:00:00",
"last_revision_date": "2026-02-02T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0112",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36902",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36902"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36908",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36908"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36897",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36897"
},
{
"published_at": "2026-02-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36912",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36912"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36904",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36904"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36900",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36900"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36903",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36903"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36909",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36909"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36899",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36899"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36906",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36906"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36907",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36907"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36901",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36901"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36905",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36905"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36898",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36898"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36910",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36910"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36911",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36911"
}
]
}
RHSA-2026:2072
Vulnerability from csaf_redhat - Published: 2026-02-11 04:49 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.18.33 is now available with updates to packages and images that fix several bugs and add enhancements. \n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.18.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.18.33. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/RHSA-2026:2071\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nSecurity Fix(es):\n\n* openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing (CVE-2025-15467)\n* libpng: LIBPNG out-of-bounds read in png_image_read_composite (CVE-2025-66293)\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2072",
"url": "https://access.redhat.com/errata/RHSA-2026:2072"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "2418711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418711"
},
{
"category": "external",
"summary": "2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2072.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.18.33 bug fix and security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:30+00:00",
"generator": {
"date": "2026-02-19T13:37:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2072",
"initial_release_date": "2026-02-11T04:49:09+00:00",
"revision_history": [
{
"date": "2026-02-11T04:49:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-11T04:49:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.18",
"product": {
"name": "Red Hat OpenShift Container Platform 4.18",
"product_id": "9Base-RHOSE-4.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.18::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-aarch64-418.94.202602022246-0",
"product": {
"name": "rhcos-aarch64-418.94.202602022246-0",
"product_id": "rhcos-aarch64-418.94.202602022246-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@418.94.202602022246?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-ppc64le-418.94.202602022246-0",
"product": {
"name": "rhcos-ppc64le-418.94.202602022246-0",
"product_id": "rhcos-ppc64le-418.94.202602022246-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@418.94.202602022246?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-s390x-418.94.202602022246-0",
"product": {
"name": "rhcos-s390x-418.94.202602022246-0",
"product_id": "rhcos-s390x-418.94.202602022246-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@418.94.202602022246?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-x86_64-418.94.202602022246-0",
"product": {
"name": "rhcos-x86_64-418.94.202602022246-0",
"product_id": "rhcos-x86_64-418.94.202602022246-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@418.94.202602022246?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-aarch64-418.94.202602022246-0 as a component of Red Hat OpenShift Container Platform 4.18",
"product_id": "9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0"
},
"product_reference": "rhcos-aarch64-418.94.202602022246-0",
"relates_to_product_reference": "9Base-RHOSE-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-ppc64le-418.94.202602022246-0 as a component of Red Hat OpenShift Container Platform 4.18",
"product_id": "9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0"
},
"product_reference": "rhcos-ppc64le-418.94.202602022246-0",
"relates_to_product_reference": "9Base-RHOSE-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-s390x-418.94.202602022246-0 as a component of Red Hat OpenShift Container Platform 4.18",
"product_id": "9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0"
},
"product_reference": "rhcos-s390x-418.94.202602022246-0",
"relates_to_product_reference": "9Base-RHOSE-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-x86_64-418.94.202602022246-0 as a component of Red Hat OpenShift Container Platform 4.18",
"product_id": "9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
},
"product_reference": "rhcos-x86_64-418.94.202602022246-0",
"relates_to_product_reference": "9Base-RHOSE-4.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T04:49:09+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2072"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T04:49:09+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2072"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-66293",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-03T21:00:59.956903+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418711"
}
],
"notes": [
{
"category": "description",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: LIBPNG out-of-bounds read in png_image_read_composite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important as it affects libpng, a widely used library for PNG image processing. The flaw is due to an out-of-bounds read in libpng\u2019s simplified API when handling specially crafted PNG images containing partial transparency and gamma correction data. Successful exploitation could result in information disclosure or cause application crashes in applications processing untrusted PNG content.\n\nFor `java-17-openjdk-headless` and `java-21-openjdk-headless`, while the affected code is present in the bundled sources, it is not exercised by these headless packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "RHBZ#2418711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418711"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1",
"url": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a",
"url": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/issues/764",
"url": "https://github.com/pnggroup/libpng/issues/764"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f"
}
],
"release_date": "2025-12-03T20:33:57.086000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T04:49:09+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2072"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202602022246-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202602022246-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libpng: LIBPNG out-of-bounds read in png_image_read_composite"
}
]
}
RHSA-2026:1326
Vulnerability from csaf_redhat - Published: 2026-01-27 07:46 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1326",
"url": "https://access.redhat.com/errata/RHSA-2026:1326"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1326.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:07+00:00",
"generator": {
"date": "2026-02-19T13:37:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1326",
"initial_release_date": "2026-01-27T07:46:31+00:00",
"revision_history": [
{
"date": "2026-01-27T07:46:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-27T07:46:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"product": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"product_id": "glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-14.el9_4.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"product": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"product_id": "glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-14.el9_4.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"product": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"product_id": "glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-14.el9_4.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"product_id": "glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-14.el9_4.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-14.el9_4.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-14.el9_4.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-14.el9_4.5.aarch64",
"product": {
"name": "glib2-0:2.68.4-14.el9_4.5.aarch64",
"product_id": "glib2-0:2.68.4-14.el9_4.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-14.el9_4.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"product": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"product_id": "glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-14.el9_4.5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"product": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"product_id": "glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-14.el9_4.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"product": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"product_id": "glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-14.el9_4.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"product_id": "glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-14.el9_4.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"product_id": "glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-14.el9_4.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-14.el9_4.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-14.el9_4.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-14.el9_4.5.ppc64le",
"product": {
"name": "glib2-0:2.68.4-14.el9_4.5.ppc64le",
"product_id": "glib2-0:2.68.4-14.el9_4.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-14.el9_4.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"product": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"product_id": "glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-14.el9_4.5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-14.el9_4.5.i686",
"product": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.i686",
"product_id": "glib2-devel-0:2.68.4-14.el9_4.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-14.el9_4.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"product": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"product_id": "glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-14.el9_4.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"product": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"product_id": "glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-14.el9_4.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"product_id": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-14.el9_4.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"product_id": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-14.el9_4.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-14.el9_4.5.i686",
"product": {
"name": "glib2-0:2.68.4-14.el9_4.5.i686",
"product_id": "glib2-0:2.68.4-14.el9_4.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-14.el9_4.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-14.el9_4.5.i686",
"product": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.i686",
"product_id": "glib2-static-0:2.68.4-14.el9_4.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-14.el9_4.5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"product": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"product_id": "glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-14.el9_4.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"product": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"product_id": "glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-14.el9_4.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"product": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"product_id": "glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-14.el9_4.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"product_id": "glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-14.el9_4.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-14.el9_4.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-14.el9_4.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-14.el9_4.5.x86_64",
"product": {
"name": "glib2-0:2.68.4-14.el9_4.5.x86_64",
"product_id": "glib2-0:2.68.4-14.el9_4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-14.el9_4.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"product": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"product_id": "glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-14.el9_4.5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"product": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"product_id": "glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-14.el9_4.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"product": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"product_id": "glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-14.el9_4.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"product": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"product_id": "glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-14.el9_4.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"product": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"product_id": "glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-14.el9_4.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"product_id": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-14.el9_4.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"product_id": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-14.el9_4.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-14.el9_4.5.s390x",
"product": {
"name": "glib2-0:2.68.4-14.el9_4.5.s390x",
"product_id": "glib2-0:2.68.4-14.el9_4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-14.el9_4.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-14.el9_4.5.s390x",
"product": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.s390x",
"product_id": "glib2-static-0:2.68.4-14.el9_4.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-14.el9_4.5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"product": {
"name": "glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"product_id": "glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.68.4-14.el9_4.5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-14.el9_4.5.src",
"product": {
"name": "glib2-0:2.68.4-14.el9_4.5.src",
"product_id": "glib2-0:2.68.4-14.el9_4.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-14.el9_4.5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-14.el9_4.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-14.el9_4.5.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.src",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-14.el9_4.5.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-27T07:46:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1326"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"AppStream-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"AppStream-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"BaseOS-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"BaseOS-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.src",
"CRB-9.4.0.Z.EUS:glib2-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-debugsource-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-devel-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-doc-0:2.68.4-14.el9_4.5.noarch",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-static-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-tests-0:2.68.4-14.el9_4.5.x86_64",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.aarch64",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.i686",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.ppc64le",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.s390x",
"CRB-9.4.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-14.el9_4.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:2485
Vulnerability from csaf_redhat - Published: 2026-02-10 20:29 - Updated: 2026-02-19 01:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Initial GA Release of Red Hat Insights proxy",
"title": "Topic"
},
{
"category": "general",
"text": "The Insights proxy Container is used by the Insights proxy product RPM\nand serves as an intermediary between cystomer systems in disconnected networks,\nair-gapped systems or systems with no outside connections and Insights.\n\nThe Insights proxy routes all Red Hat Insights traffic through itself, providing\na layer of privary and security for disconnected customer systems.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2485",
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-11187",
"url": "https://access.redhat.com/security/cve/CVE-2025-11187"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13601",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14104",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15467",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15468",
"url": "https://access.redhat.com/security/cve/CVE-2025-15468"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15469",
"url": "https://access.redhat.com/security/cve/CVE-2025-15469"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66199",
"url": "https://access.redhat.com/security/cve/CVE-2025-66199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68160",
"url": "https://access.redhat.com/security/cve/CVE-2025-68160"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68973",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69418",
"url": "https://access.redhat.com/security/cve/CVE-2025-69418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69419",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69420",
"url": "https://access.redhat.com/security/cve/CVE-2025-69420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69421",
"url": "https://access.redhat.com/security/cve/CVE-2025-69421"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9086",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22795",
"url": "https://access.redhat.com/security/cve/CVE-2026-22795"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22796",
"url": "https://access.redhat.com/security/cve/CVE-2026-22796"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2485.json"
}
],
"title": "Red Hat Security Advisory: Insights proxy Container Image",
"tracking": {
"current_release_date": "2026-02-19T01:07:39+00:00",
"generator": {
"date": "2026-02-19T01:07:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2485",
"initial_release_date": "2026-02-10T20:29:13+00:00",
"revision_history": [
{
"date": "2026-02-10T20:29:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-10T20:29:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T01:07:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Insights proxy 1.5",
"product": {
"name": "Red Hat Insights proxy 1.5",
"product_id": "Red Hat Insights proxy 1.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:insights_proxy:1.5::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Insights proxy"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64",
"product": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64",
"product_id": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64",
"product_identification_helper": {
"purl": "pkg:oci/insights-proxy-container-rhel9@sha256%3Aab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016?arch=amd64\u0026repository_url=registry.redhat.io/insights-proxy\u0026tag=1770740405"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"product": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"product_id": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/insights-proxy-container-rhel9@sha256%3A975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc?arch=arm64\u0026repository_url=registry.redhat.io/insights-proxy\u0026tag=1770740405"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64 as a component of Red Hat Insights proxy 1.5",
"product_id": "Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64"
},
"product_reference": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"relates_to_product_reference": "Red Hat Insights proxy 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64 as a component of Red Hat Insights proxy 1.5",
"product_id": "Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
},
"product_reference": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64",
"relates_to_product_reference": "Red Hat Insights proxy 1.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-09-12T06:01:02.244669+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394750"
}
],
"notes": [
{
"category": "description",
"text": "1. A cookie is set using the `secure` keyword for `https://target` \n 2. curl is redirected to or otherwise made to speak with `http://target` (same \n hostname, but using clear text HTTP) using the same cookie set \n 3. The same cookie name is set - but with just a slash as path (`path=\\\"/\\\",`).\n Since this site is not secure, the cookie *should* just be ignored.\n4. A bug in the path comparison logic makes curl read outside a heap buffer\n boundary\n\nThe bug either causes a crash or it potentially makes the comparison come to\nthe wrong conclusion and lets the clear-text site override the contents of the\nsecure cookie, contrary to expectations and depending on the memory contents\nimmediately following the single-byte allocation that holds the path.\n\nThe presumed and correct behavior would be to plainly ignore the second set of\nthe cookie since it was already set as secure on a secure host so overriding\nit on an insecure host should not be okay.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: Curl out of bounds read for cookie path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "RHBZ#2394750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.html",
"url": "https://curl.se/docs/CVE-2025-9086.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.json",
"url": "https://curl.se/docs/CVE-2025-9086.json"
},
{
"category": "external",
"summary": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6",
"url": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3294999",
"url": "https://hackerone.com/reports/3294999"
}
],
"release_date": "2025-09-12T05:10:03.815000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: libcurl: Curl out of bounds read for cookie path"
},
{
"cve": "CVE-2025-11187",
"cwe": {
"id": "CWE-233",
"name": "Improper Handling of Parameters"
},
"discovery_date": "2026-01-16T14:21:50.559000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430375"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. It affects OpenSSL versions 3.6, 3.5, and 3.4, where improper validation of PBMAC1 parameters in PKCS#12 MAC verification can lead to a stack buffer overflow or NULL pointer dereference. Exploitation requires an application to process a maliciously crafted PKCS#12 file, which is uncommon as these files are typically trusted. OpenSSL versions 3.3, 3.0, 1.1.1, and 1.0.2 are not affected as they do not support PBMAC1 in PKCS#12.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-11187"
},
{
"category": "external",
"summary": "RHBZ#2430375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11187"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid processing untrusted PKCS#12 files. Applications should only handle PKCS#12 files from trusted sources, as these files are typically used for storing private keys and are expected to be secure.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file"
},
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
},
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-05T14:16:36.004000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419369"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "RHBZ#2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
}
],
"release_date": "2025-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-15468",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2026-01-16T14:21:51.062000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430377"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The NULL pointer dereference in the `SSL_CIPHER_find()` function, affecting OpenSSL versions 3.3, 3.4, 3.5, and 3.6, occurs only when applications utilizing the QUIC protocol uncommonly invoke this function from the `client_hello_cb` callback with an unknown cipher ID. This specific usage pattern and the resulting Denial of Service limit the overall impact in the Red Hat context.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15468"
},
{
"category": "external",
"summary": "RHBZ#2430377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430377"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15468"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling"
},
{
"cve": "CVE-2025-15469",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"discovery_date": "2026-01-16T14:21:51.411000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430378"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The flaw affects the `openssl dgst` command-line tool when used with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) on files larger than 16MB. Impact is limited as it requires both signing and verification to be performed using the affected command, and verifiers using library APIs are not impacted.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15469"
},
{
"category": "external",
"summary": "RHBZ#2430378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430378"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15469"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using the `openssl dgst` command with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) for files larger than 16MB. Instead, utilize streaming digest algorithms with `openssl dgst` or use library APIs for signing and verification, as these are not affected by the truncation vulnerability. Users should ensure that input files for one-shot signing/verification with `openssl dgst` do not exceed 16MB.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation"
},
{
"cve": "CVE-2025-66199",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-16T14:21:51.739000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. The flaw in OpenSSL 3.3, 3.4, 3.5, and 3.6 allows an attacker to cause excessive memory allocation during TLS 1.3 handshake with certificate compression, potentially leading to a Denial of Service. This affects both clients and servers in mutual TLS scenarios where certificate compression is negotiated. Servers not requesting client certificates are not vulnerable to client-initiated attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66199"
},
{
"category": "external",
"summary": "RHBZ#2430379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66199"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "To mitigate this issue, disable the reception of compressed certificates by setting the SSL_OP_NO_RX_CERTIFICATE_COMPRESSION option in OpenSSL configurations. This will prevent the vulnerable code path from being exercised.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression"
},
{
"cve": "CVE-2025-68160",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2026-01-16T14:21:52.088000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430380"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The `BIO_f_linebuffer` filter, where this heap out-of-bounds write occurs, is not used by default in TLS/SSL data paths within Red Hat products. Exploitation requires third-party applications to explicitly use this filter with a BIO chain that can short-write and process large, newline-free data influenced by an attacker, which is an unlikely scenario under attacker control. Red Hat FIPS modules are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68160"
},
{
"category": "external",
"summary": "RHBZ#2430380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430380"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68160"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter"
},
{
"cve": "CVE-2025-68973",
"cwe": {
"id": "CWE-675",
"name": "Multiple Operations on Resource in Single-Operation Context"
},
"discovery_date": "2025-12-28T17:00:44.161022+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425966"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in GnuPG\u0027s `armor_filter` function allows an attacker with local access to provide crafted input, potentially leading to information disclosure and arbitrary code execution due to an out-of-bounds write. Exploitation requires high attack complexity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "RHBZ#2425966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306",
"url": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9",
"url": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9"
},
{
"category": "external",
"summary": "https://gpg.fail/memcpy",
"url": "https://gpg.fail/memcpy"
},
{
"category": "external",
"summary": "https://news.ycombinator.com/item?id=46403200",
"url": "https://news.ycombinator.com/item?id=46403200"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/12/28/5",
"url": "https://www.openwall.com/lists/oss-security/2025/12/28/5"
}
],
"release_date": "2025-12-28T16:19:11.019000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid processing untrusted or unverified input with GnuPG. Exercise caution when handling GnuPG-encrypted or signed data from unknown or suspicious sources, as specially crafted input could trigger the vulnerability. This operational control reduces the attack surface by limiting exposure to malicious data.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write"
},
{
"cve": "CVE-2025-69418",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2026-01-16T14:21:52.438000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430381"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. In the Red Hat context, impact is limited because typical OpenSSL consumers using higher-level EVP APIs are not affected. The flaw only manifests when applications directly call low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in hardware-accelerated builds. Additionally, TLS does not use OCB ciphersuites, and FIPS modules are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69418"
},
{
"category": "external",
"summary": "RHBZ#2430381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69418"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls"
},
{
"cve": "CVE-2025-69419",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-01-16T14:21:52.793000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430386"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. An out-of-bounds write in OpenSSL\u0027s PKCS12_get_friendlyname() function can lead to denial of service or arbitrary code execution. Exploitation requires an application to parse a specially crafted malicious PKCS#12 file. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "RHBZ#2430386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, Red Hat recommends avoiding the processing of PKCS#12 files from untrusted or unverified sources. Applications that use the `PKCS12_get_friendlyname()` API should ensure that PKCS#12 files are only processed if they originate from trusted entities. Restricting the input sources for PKCS#12 files can significantly reduce the attack surface for this flaw.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing"
},
{
"cve": "CVE-2025-69420",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-01-16T14:21:53.497000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430388"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. A type confusion flaw in the TimeStamp Response verification code can lead to a Denial of Service when processing a specially crafted TimeStamp Response. Exploitation requires an application to call `TS_RESP_verify_response()` with a malformed response, and the TimeStamp protocol (RFC 3161) is not widely used. Red Hat FIPS modules are not affected as the TimeStamp Response implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69420"
},
{
"category": "external",
"summary": "RHBZ#2430388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69420"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response"
},
{
"cve": "CVE-2025-69421",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2026-01-16T14:21:53.845000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430387"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat because it requires an application to process a specially crafted, malformed PKCS#12 file, leading to a Denial of Service. The vulnerability is limited to a crash and cannot be escalated to achieve code execution or memory disclosure. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69421"
},
{
"category": "external",
"summary": "RHBZ#2430387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69421"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing"
},
{
"cve": "CVE-2026-22795",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-01-16T14:21:53.146000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430389"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. An application processing a maliciously crafted PKCS#12 file can be caused to dereference an invalid or NULL pointer, resulting in a Denial of Service. In the Red Hat context, impact is limited as PKCS#12 files are typically used for trusted private keys and are not commonly accepted from untrusted sources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22795"
},
{
"category": "external",
"summary": "RHBZ#2430389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22795"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing"
},
{
"cve": "CVE-2026-22796",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-01-16T14:43:21.598000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430390"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. A type confusion flaw in the legacy PKCS#7 API can lead to a Denial of Service when processing specially crafted PKCS#7 data. Exploitation requires an application to perform signature verification of malformed PKCS#7 data. Red Hat products utilizing the FIPS module are not affected as the PKCS#7 parsing is outside the module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22796"
},
{
"category": "external",
"summary": "RHBZ#2430390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22796"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T20:29:13+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat\nInsights proxy product RPM.\n\nBefore applying this update, make sure all previously released errata relevant to\nyour system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:975a1e501a8520df83f3f4114e72a71384ff1866ec99c7a45fffbf8c76ef5cbc_arm64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:ab86ba36e62e8aec5ba48e9e0076b1f8086c48157c85990be0e2ce3e03273016_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification"
}
]
}
RHSA-2026:2633
Vulnerability from csaf_redhat - Published: 2026-02-18 21:01 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.19.24 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.19.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.19.24. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2026:2632\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nSecurity Fix(es):\n\n* openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing (CVE-2025-15467)\n* libpng: LIBPNG out-of-bounds read in png_image_read_composite (CVE-2025-66293)\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2633",
"url": "https://access.redhat.com/errata/RHSA-2026:2633"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "2418711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418711"
},
{
"category": "external",
"summary": "2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "OCPBUGS-64612",
"url": "https://issues.redhat.com/browse/OCPBUGS-64612"
},
{
"category": "external",
"summary": "OCPBUGS-68357",
"url": "https://issues.redhat.com/browse/OCPBUGS-68357"
},
{
"category": "external",
"summary": "OCPBUGS-69838",
"url": "https://issues.redhat.com/browse/OCPBUGS-69838"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2633.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.19.24 bug fix and security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:35+00:00",
"generator": {
"date": "2026-02-19T13:37:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2633",
"initial_release_date": "2026-02-18T21:01:52+00:00",
"revision_history": [
{
"date": "2026-02-18T21:01:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-18T21:01:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.19",
"product": {
"name": "Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.19::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-aarch64-9.6.20260211-0",
"product": {
"name": "rhcos-aarch64-9.6.20260211-0",
"product_id": "rhcos-aarch64-9.6.20260211-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@9.6.20260211?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rhcos-aarch64-4.19.9.6.202602112047-0",
"product": {
"name": "rhcos-aarch64-4.19.9.6.202602112047-0",
"product_id": "rhcos-aarch64-4.19.9.6.202602112047-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@4.19.9.6.202602112047?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-ppc64le-9.6.20260211-0",
"product": {
"name": "rhcos-ppc64le-9.6.20260211-0",
"product_id": "rhcos-ppc64le-9.6.20260211-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@9.6.20260211?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rhcos-ppc64le-4.19.9.6.202602112047-0",
"product": {
"name": "rhcos-ppc64le-4.19.9.6.202602112047-0",
"product_id": "rhcos-ppc64le-4.19.9.6.202602112047-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@4.19.9.6.202602112047?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-s390x-4.19.9.6.202602112047-0",
"product": {
"name": "rhcos-s390x-4.19.9.6.202602112047-0",
"product_id": "rhcos-s390x-4.19.9.6.202602112047-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@4.19.9.6.202602112047?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rhcos-s390x-9.6.20260211-0",
"product": {
"name": "rhcos-s390x-9.6.20260211-0",
"product_id": "rhcos-s390x-9.6.20260211-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@9.6.20260211?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-x86_64-4.19.9.6.202602112047-0",
"product": {
"name": "rhcos-x86_64-4.19.9.6.202602112047-0",
"product_id": "rhcos-x86_64-4.19.9.6.202602112047-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@4.19.9.6.202602112047?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rhcos-x86_64-9.6.20260211-0",
"product": {
"name": "rhcos-x86_64-9.6.20260211-0",
"product_id": "rhcos-x86_64-9.6.20260211-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@9.6.20260211?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-aarch64-4.19.9.6.202602112047-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0"
},
"product_reference": "rhcos-aarch64-4.19.9.6.202602112047-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-aarch64-9.6.20260211-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0"
},
"product_reference": "rhcos-aarch64-9.6.20260211-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-ppc64le-4.19.9.6.202602112047-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0"
},
"product_reference": "rhcos-ppc64le-4.19.9.6.202602112047-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-ppc64le-9.6.20260211-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0"
},
"product_reference": "rhcos-ppc64le-9.6.20260211-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-s390x-4.19.9.6.202602112047-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0"
},
"product_reference": "rhcos-s390x-4.19.9.6.202602112047-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-s390x-9.6.20260211-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0"
},
"product_reference": "rhcos-s390x-9.6.20260211-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-x86_64-4.19.9.6.202602112047-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0"
},
"product_reference": "rhcos-x86_64-4.19.9.6.202602112047-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-x86_64-9.6.20260211-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
},
"product_reference": "rhcos-x86_64-9.6.20260211-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T21:01:52+00:00",
"details": "For OpenShift Container Platform 4.19 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:3ef832b8bb0d56331035ba54af36c36be46d6c6dc1a41e300055692f02bb001d\n\n (For s390x architecture)\n The image digest is sha256:f57a48ce1d9f20cfa338c367638038d4796cbb2142d22dc470fb47e422614136\n\n (For ppc64le architecture)\n The image digest is sha256:5d845876c06ea2816b6ae1502cee1c9bfb16c1c474cafcc5a1764a1390db95a9\n\n (For aarch64 architecture)\n The image digest is sha256:77518b9c0bbde558527b26225fa0dd2c666fedf7e5dc5669e89e342024de9283\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T21:01:52+00:00",
"details": "For OpenShift Container Platform 4.19 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:3ef832b8bb0d56331035ba54af36c36be46d6c6dc1a41e300055692f02bb001d\n\n (For s390x architecture)\n The image digest is sha256:f57a48ce1d9f20cfa338c367638038d4796cbb2142d22dc470fb47e422614136\n\n (For ppc64le architecture)\n The image digest is sha256:5d845876c06ea2816b6ae1502cee1c9bfb16c1c474cafcc5a1764a1390db95a9\n\n (For aarch64 architecture)\n The image digest is sha256:77518b9c0bbde558527b26225fa0dd2c666fedf7e5dc5669e89e342024de9283\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-66293",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-03T21:00:59.956903+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418711"
}
],
"notes": [
{
"category": "description",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: LIBPNG out-of-bounds read in png_image_read_composite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important as it affects libpng, a widely used library for PNG image processing. The flaw is due to an out-of-bounds read in libpng\u2019s simplified API when handling specially crafted PNG images containing partial transparency and gamma correction data. Successful exploitation could result in information disclosure or cause application crashes in applications processing untrusted PNG content.\n\nFor `java-17-openjdk-headless` and `java-21-openjdk-headless`, while the affected code is present in the bundled sources, it is not exercised by these headless packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "RHBZ#2418711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418711"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1",
"url": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a",
"url": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/issues/764",
"url": "https://github.com/pnggroup/libpng/issues/764"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f"
}
],
"release_date": "2025-12-03T20:33:57.086000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T21:01:52+00:00",
"details": "For OpenShift Container Platform 4.19 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:3ef832b8bb0d56331035ba54af36c36be46d6c6dc1a41e300055692f02bb001d\n\n (For s390x architecture)\n The image digest is sha256:f57a48ce1d9f20cfa338c367638038d4796cbb2142d22dc470fb47e422614136\n\n (For ppc64le architecture)\n The image digest is sha256:5d845876c06ea2816b6ae1502cee1c9bfb16c1c474cafcc5a1764a1390db95a9\n\n (For aarch64 architecture)\n The image digest is sha256:77518b9c0bbde558527b26225fa0dd2c666fedf7e5dc5669e89e342024de9283\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-aarch64-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-s390x-9.6.20260211-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202602112047-0",
"9Base-RHOSE-4.19:rhcos-x86_64-9.6.20260211-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libpng: LIBPNG out-of-bounds read in png_image_read_composite"
}
]
}
RHSA-2026:2563
Vulnerability from csaf_redhat - Published: 2026-02-11 14:34 - Updated: 2026-02-20 01:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The latest release of Red Hat Update Infrastructure. For more details, see the product documentation.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Update Infrastructure (RHUI) container images are based on the latest RHUI RPM packages and the ubi9 or ubi9-init base images.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2563",
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "external",
"summary": "https://access.redhat.com/products/red-hat-update-infrastructure",
"url": "https://access.redhat.com/products/red-hat-update-infrastructure"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-11187",
"url": "https://access.redhat.com/security/cve/CVE-2025-11187"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12084",
"url": "https://access.redhat.com/security/cve/CVE-2025-12084"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13601",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13836",
"url": "https://access.redhat.com/security/cve/CVE-2025-13836"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14104",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15467",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15468",
"url": "https://access.redhat.com/security/cve/CVE-2025-15468"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15469",
"url": "https://access.redhat.com/security/cve/CVE-2025-15469"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66199",
"url": "https://access.redhat.com/security/cve/CVE-2025-66199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68160",
"url": "https://access.redhat.com/security/cve/CVE-2025-68160"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68973",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69418",
"url": "https://access.redhat.com/security/cve/CVE-2025-69418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69419",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69420",
"url": "https://access.redhat.com/security/cve/CVE-2025-69420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69421",
"url": "https://access.redhat.com/security/cve/CVE-2025-69421"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9086",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22795",
"url": "https://access.redhat.com/security/cve/CVE-2026-22795"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22796",
"url": "https://access.redhat.com/security/cve/CVE-2026-22796"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_update_infrastructure/5",
"url": "https://docs.redhat.com/en/documentation/red_hat_update_infrastructure/5"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2563.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Update Infrastructure 5 security update",
"tracking": {
"current_release_date": "2026-02-20T01:02:14+00:00",
"generator": {
"date": "2026-02-20T01:02:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2563",
"initial_release_date": "2026-02-11T14:34:45+00:00",
"revision_history": [
{
"date": "2026-02-11T14:34:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-11T14:34:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-20T01:02:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Update Infrastructure 5",
"product": {
"name": "Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhui:5::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Update Infrastructure"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"product": {
"name": "registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"product_id": "registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cds-rhel9@sha256%3A83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1770808689"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"product": {
"name": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"product_id": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/haproxy-rhel9@sha256%3A409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1770807477"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"product": {
"name": "registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"product_id": "registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/installer-rhel9@sha256%3A48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1770646925"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64",
"product": {
"name": "registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64",
"product_id": "registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhua-rhel9@sha256%3Adf709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8?arch=amd64\u0026repository_url=registry.redhat.io/rhui5\u0026tag=1770808765"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64"
},
"product_reference": "registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64"
},
"product_reference": "registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
},
"product_reference": "registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64 as a component of Red Hat Update Infrastructure 5",
"product_id": "Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
},
"product_reference": "registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64",
"relates_to_product_reference": "Red Hat Update Infrastructure 5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-09-12T06:01:02.244669+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394750"
}
],
"notes": [
{
"category": "description",
"text": "1. A cookie is set using the `secure` keyword for `https://target` \n 2. curl is redirected to or otherwise made to speak with `http://target` (same \n hostname, but using clear text HTTP) using the same cookie set \n 3. The same cookie name is set - but with just a slash as path (`path=\\\"/\\\",`).\n Since this site is not secure, the cookie *should* just be ignored.\n4. A bug in the path comparison logic makes curl read outside a heap buffer\n boundary\n\nThe bug either causes a crash or it potentially makes the comparison come to\nthe wrong conclusion and lets the clear-text site override the contents of the\nsecure cookie, contrary to expectations and depending on the memory contents\nimmediately following the single-byte allocation that holds the path.\n\nThe presumed and correct behavior would be to plainly ignore the second set of\nthe cookie since it was already set as secure on a secure host so overriding\nit on an insecure host should not be okay.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: Curl out of bounds read for cookie path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "RHBZ#2394750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.html",
"url": "https://curl.se/docs/CVE-2025-9086.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.json",
"url": "https://curl.se/docs/CVE-2025-9086.json"
},
{
"category": "external",
"summary": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6",
"url": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3294999",
"url": "https://hackerone.com/reports/3294999"
}
],
"release_date": "2025-09-12T05:10:03.815000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: libcurl: Curl out of bounds read for cookie path"
},
{
"cve": "CVE-2025-11187",
"cwe": {
"id": "CWE-233",
"name": "Improper Handling of Parameters"
},
"discovery_date": "2026-01-16T14:21:50.559000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430375"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. It affects OpenSSL versions 3.6, 3.5, and 3.4, where improper validation of PBMAC1 parameters in PKCS#12 MAC verification can lead to a stack buffer overflow or NULL pointer dereference. Exploitation requires an application to process a maliciously crafted PKCS#12 file, which is uncommon as these files are typically trusted. OpenSSL versions 3.3, 3.0, 1.1.1, and 1.0.2 are not affected as they do not support PBMAC1 in PKCS#12.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-11187"
},
{
"category": "external",
"summary": "RHBZ#2430375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11187"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid processing untrusted PKCS#12 files. Applications should only handle PKCS#12 files from trusted sources, as these files are typically used for storing private keys and are expected to be secure.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file"
},
{
"cve": "CVE-2025-12084",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-03T19:01:03.489250+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418655"
}
],
"notes": [
{
"category": "description",
"text": "When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it can lead to a denial of service. The flaw exists in the `xml.dom.minidom` module of cpython, where a quadratic algorithm in methods like `appendChild()` can be triggered when processing excessively nested XML documents. When successfully exploited this may impact the availability of applications utilizing this functionality across affected Red Hat products.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12084"
},
{
"category": "external",
"summary": "RHBZ#2418655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418655"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12084",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12084"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/142145",
"url": "https://github.com/python/cpython/issues/142145"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/142146",
"url": "https://github.com/python/cpython/pull/142146"
}
],
"release_date": "2025-12-03T18:55:32.222000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service"
},
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
},
{
"cve": "CVE-2025-13836",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-01T19:01:03.091899+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418078"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the http.client module in the Python standard library. When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This issue allows a malicious server to cause the client to read large amounts of data into memory, potentially causing memory allocations errors, swapping, out-of-memory conditions or even system freezes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: Excessive read buffering DoS in http.client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue can only be exploited by Python applications using the http.client.HTTPResponse.read function without the amount parameter, which specifies the read size in bytes. Note that Python libraries may use this function internally and make applications vulnerable. Additionally, vulnerable Python applications must connect to a malicious or compromised server that replies with a very large or crafted Content-Length header to trigger this issue, limiting the exposure of this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13836"
},
{
"category": "external",
"summary": "RHBZ#2418078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418078"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13836"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/119451",
"url": "https://github.com/python/cpython/issues/119451"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/119454",
"url": "https://github.com/python/cpython/pull/119454"
}
],
"release_date": "2025-12-01T18:02:38.483000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Since this vulnerability is triggered when no read amount is specified and the client defaults to using the potentially malicious Content-Length header, developers can mitigate this issue in their code by always imposing an explicit, safe limit on data reads.\n\nApplications using the http.client.HTTPResponse.read function directly can ensure that read operations specify a byte limit:\n\n~~~\n...\nmax_safe_read = 10 * 1024 * 1024\ndata = response.read(max_safe_read)\n...\n~~~",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: Excessive read buffering DoS in http.client"
},
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-05T14:16:36.004000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419369"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "RHBZ#2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
}
],
"release_date": "2025-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-15468",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2026-01-16T14:21:51.062000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430377"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The NULL pointer dereference in the `SSL_CIPHER_find()` function, affecting OpenSSL versions 3.3, 3.4, 3.5, and 3.6, occurs only when applications utilizing the QUIC protocol uncommonly invoke this function from the `client_hello_cb` callback with an unknown cipher ID. This specific usage pattern and the resulting Denial of Service limit the overall impact in the Red Hat context.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15468"
},
{
"category": "external",
"summary": "RHBZ#2430377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430377"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15468"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling"
},
{
"cve": "CVE-2025-15469",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"discovery_date": "2026-01-16T14:21:51.411000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430378"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The flaw affects the `openssl dgst` command-line tool when used with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) on files larger than 16MB. Impact is limited as it requires both signing and verification to be performed using the affected command, and verifiers using library APIs are not impacted.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15469"
},
{
"category": "external",
"summary": "RHBZ#2430378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430378"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15469"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using the `openssl dgst` command with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) for files larger than 16MB. Instead, utilize streaming digest algorithms with `openssl dgst` or use library APIs for signing and verification, as these are not affected by the truncation vulnerability. Users should ensure that input files for one-shot signing/verification with `openssl dgst` do not exceed 16MB.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation"
},
{
"cve": "CVE-2025-66199",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-16T14:21:51.739000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. The flaw in OpenSSL 3.3, 3.4, 3.5, and 3.6 allows an attacker to cause excessive memory allocation during TLS 1.3 handshake with certificate compression, potentially leading to a Denial of Service. This affects both clients and servers in mutual TLS scenarios where certificate compression is negotiated. Servers not requesting client certificates are not vulnerable to client-initiated attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66199"
},
{
"category": "external",
"summary": "RHBZ#2430379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66199"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "To mitigate this issue, disable the reception of compressed certificates by setting the SSL_OP_NO_RX_CERTIFICATE_COMPRESSION option in OpenSSL configurations. This will prevent the vulnerable code path from being exercised.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-68160",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2026-01-16T14:21:52.088000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430380"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The `BIO_f_linebuffer` filter, where this heap out-of-bounds write occurs, is not used by default in TLS/SSL data paths within Red Hat products. Exploitation requires third-party applications to explicitly use this filter with a BIO chain that can short-write and process large, newline-free data influenced by an attacker, which is an unlikely scenario under attacker control. Red Hat FIPS modules are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68160"
},
{
"category": "external",
"summary": "RHBZ#2430380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430380"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68160"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter"
},
{
"cve": "CVE-2025-68973",
"cwe": {
"id": "CWE-675",
"name": "Multiple Operations on Resource in Single-Operation Context"
},
"discovery_date": "2025-12-28T17:00:44.161022+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425966"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in GnuPG\u0027s `armor_filter` function allows an attacker with local access to provide crafted input, potentially leading to information disclosure and arbitrary code execution due to an out-of-bounds write. Exploitation requires high attack complexity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "RHBZ#2425966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306",
"url": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9",
"url": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9"
},
{
"category": "external",
"summary": "https://gpg.fail/memcpy",
"url": "https://gpg.fail/memcpy"
},
{
"category": "external",
"summary": "https://news.ycombinator.com/item?id=46403200",
"url": "https://news.ycombinator.com/item?id=46403200"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/12/28/5",
"url": "https://www.openwall.com/lists/oss-security/2025/12/28/5"
}
],
"release_date": "2025-12-28T16:19:11.019000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid processing untrusted or unverified input with GnuPG. Exercise caution when handling GnuPG-encrypted or signed data from unknown or suspicious sources, as specially crafted input could trigger the vulnerability. This operational control reduces the attack surface by limiting exposure to malicious data.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write"
},
{
"cve": "CVE-2025-69418",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2026-01-16T14:21:52.438000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430381"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. In the Red Hat context, impact is limited because typical OpenSSL consumers using higher-level EVP APIs are not affected. The flaw only manifests when applications directly call low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in hardware-accelerated builds. Additionally, TLS does not use OCB ciphersuites, and FIPS modules are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69418"
},
{
"category": "external",
"summary": "RHBZ#2430381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69418"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls"
},
{
"cve": "CVE-2025-69419",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-01-16T14:21:52.793000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430386"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. An out-of-bounds write in OpenSSL\u0027s PKCS12_get_friendlyname() function can lead to denial of service or arbitrary code execution. Exploitation requires an application to parse a specially crafted malicious PKCS#12 file. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "RHBZ#2430386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, Red Hat recommends avoiding the processing of PKCS#12 files from untrusted or unverified sources. Applications that use the `PKCS12_get_friendlyname()` API should ensure that PKCS#12 files are only processed if they originate from trusted entities. Restricting the input sources for PKCS#12 files can significantly reduce the attack surface for this flaw.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing"
},
{
"cve": "CVE-2025-69420",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-01-16T14:21:53.497000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430388"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. A type confusion flaw in the TimeStamp Response verification code can lead to a Denial of Service when processing a specially crafted TimeStamp Response. Exploitation requires an application to call `TS_RESP_verify_response()` with a malformed response, and the TimeStamp protocol (RFC 3161) is not widely used. Red Hat FIPS modules are not affected as the TimeStamp Response implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69420"
},
{
"category": "external",
"summary": "RHBZ#2430388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69420"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response"
},
{
"cve": "CVE-2025-69421",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2026-01-16T14:21:53.845000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430387"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat because it requires an application to process a specially crafted, malformed PKCS#12 file, leading to a Denial of Service. The vulnerability is limited to a crash and cannot be escalated to achieve code execution or memory disclosure. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69421"
},
{
"category": "external",
"summary": "RHBZ#2430387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69421"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-22795",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-01-16T14:21:53.146000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430389"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. An application processing a maliciously crafted PKCS#12 file can be caused to dereference an invalid or NULL pointer, resulting in a Denial of Service. In the Red Hat context, impact is limited as PKCS#12 files are typically used for trusted private keys and are not commonly accepted from untrusted sources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22795"
},
{
"category": "external",
"summary": "RHBZ#2430389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22795"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing"
},
{
"cve": "CVE-2026-22796",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-01-16T14:43:21.598000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430390"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. A type confusion flaw in the legacy PKCS#7 API can lead to a Denial of Service when processing specially crafted PKCS#7 data. Exploitation requires an application to perform signature verification of malformed PKCS#7 data. Red Hat products utilizing the FIPS module are not affected as the PKCS#7 parsing is outside the module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"known_not_affected": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22796"
},
{
"category": "external",
"summary": "RHBZ#2430390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22796"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-11T14:34:45+00:00",
"details": "The container images provided by this release, apart from the installer, should be deployed using rhui-installer utility.\nSee the official documentation for more details.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/cds-rhel9@sha256:83e8b356eb4697a81ff8c6764dc976862800f4c78122a606173340a6e105a4fe_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/haproxy-rhel9@sha256:409a64405669fd11ad8700356243762a3507430f9bba4100bb92765d4482b7e5_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/installer-rhel9@sha256:48cf7cf48dfadb17f9357bf1894a5d0393551a893faa8b0ea0e11fe1ffed497f_amd64",
"Red Hat Update Infrastructure 5:registry.redhat.io/rhui5/rhua-rhel9@sha256:df709663b581b740006c6ea4b297978932874eade1563c3952e0594e926aa5f8_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification"
}
]
}
RHSA-2026:1608
Vulnerability from csaf_redhat - Published: 2026-02-02 01:55 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1608",
"url": "https://access.redhat.com/errata/RHSA-2026:1608"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1608.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:19+00:00",
"generator": {
"date": "2026-02-19T13:37:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1608",
"initial_release_date": "2026-02-02T01:55:56+00:00",
"revision_history": [
{
"date": "2026-02-02T01:55:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-02T01:55:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.1-11.el7_9.src",
"product": {
"name": "glib2-0:2.56.1-11.el7_9.src",
"product_id": "glib2-0:2.56.1-11.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.1-11.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.1-11.el7_9.ppc",
"product": {
"name": "glib2-0:2.56.1-11.el7_9.ppc",
"product_id": "glib2-0:2.56.1-11.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.1-11.el7_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc",
"product": {
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc",
"product_id": "glib2-devel-0:2.56.1-11.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.1-11.el7_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"product": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"product_id": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.1-11.el7_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.1-11.el7_9.ppc",
"product": {
"name": "glib2-static-0:2.56.1-11.el7_9.ppc",
"product_id": "glib2-static-0:2.56.1-11.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.1-11.el7_9?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.1-11.el7_9.ppc64",
"product": {
"name": "glib2-0:2.56.1-11.el7_9.ppc64",
"product_id": "glib2-0:2.56.1-11.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.1-11.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc64",
"product": {
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc64",
"product_id": "glib2-devel-0:2.56.1-11.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.1-11.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"product": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"product_id": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.1-11.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.1-11.el7_9.ppc64",
"product": {
"name": "glib2-fam-0:2.56.1-11.el7_9.ppc64",
"product_id": "glib2-fam-0:2.56.1-11.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.1-11.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.1-11.el7_9.ppc64",
"product": {
"name": "glib2-static-0:2.56.1-11.el7_9.ppc64",
"product_id": "glib2-static-0:2.56.1-11.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.1-11.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.1-11.el7_9.ppc64",
"product": {
"name": "glib2-tests-0:2.56.1-11.el7_9.ppc64",
"product_id": "glib2-tests-0:2.56.1-11.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.1-11.el7_9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.1-11.el7_9.s390",
"product": {
"name": "glib2-0:2.56.1-11.el7_9.s390",
"product_id": "glib2-0:2.56.1-11.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.1-11.el7_9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.1-11.el7_9.s390",
"product": {
"name": "glib2-devel-0:2.56.1-11.el7_9.s390",
"product_id": "glib2-devel-0:2.56.1-11.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.1-11.el7_9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"product": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"product_id": "glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.1-11.el7_9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.1-11.el7_9.s390",
"product": {
"name": "glib2-static-0:2.56.1-11.el7_9.s390",
"product_id": "glib2-static-0:2.56.1-11.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.1-11.el7_9?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.1-11.el7_9.s390x",
"product": {
"name": "glib2-0:2.56.1-11.el7_9.s390x",
"product_id": "glib2-0:2.56.1-11.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.1-11.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.1-11.el7_9.s390x",
"product": {
"name": "glib2-devel-0:2.56.1-11.el7_9.s390x",
"product_id": "glib2-devel-0:2.56.1-11.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.1-11.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"product": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"product_id": "glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.1-11.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.1-11.el7_9.s390x",
"product": {
"name": "glib2-fam-0:2.56.1-11.el7_9.s390x",
"product_id": "glib2-fam-0:2.56.1-11.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.1-11.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.1-11.el7_9.s390x",
"product": {
"name": "glib2-static-0:2.56.1-11.el7_9.s390x",
"product_id": "glib2-static-0:2.56.1-11.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.1-11.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.1-11.el7_9.s390x",
"product": {
"name": "glib2-tests-0:2.56.1-11.el7_9.s390x",
"product_id": "glib2-tests-0:2.56.1-11.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.1-11.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.1-11.el7_9.x86_64",
"product": {
"name": "glib2-0:2.56.1-11.el7_9.x86_64",
"product_id": "glib2-0:2.56.1-11.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.1-11.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.1-11.el7_9.x86_64",
"product": {
"name": "glib2-devel-0:2.56.1-11.el7_9.x86_64",
"product_id": "glib2-devel-0:2.56.1-11.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.1-11.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"product_id": "glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.1-11.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.1-11.el7_9.x86_64",
"product": {
"name": "glib2-fam-0:2.56.1-11.el7_9.x86_64",
"product_id": "glib2-fam-0:2.56.1-11.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.1-11.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.1-11.el7_9.x86_64",
"product": {
"name": "glib2-static-0:2.56.1-11.el7_9.x86_64",
"product_id": "glib2-static-0:2.56.1-11.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.1-11.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.1-11.el7_9.x86_64",
"product": {
"name": "glib2-tests-0:2.56.1-11.el7_9.x86_64",
"product_id": "glib2-tests-0:2.56.1-11.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.1-11.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.1-11.el7_9.i686",
"product": {
"name": "glib2-0:2.56.1-11.el7_9.i686",
"product_id": "glib2-0:2.56.1-11.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.1-11.el7_9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.1-11.el7_9.i686",
"product": {
"name": "glib2-devel-0:2.56.1-11.el7_9.i686",
"product_id": "glib2-devel-0:2.56.1-11.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.1-11.el7_9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"product": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"product_id": "glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.1-11.el7_9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.1-11.el7_9.i686",
"product": {
"name": "glib2-static-0:2.56.1-11.el7_9.i686",
"product_id": "glib2-static-0:2.56.1-11.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.1-11.el7_9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.1-11.el7_9.ppc64le",
"product": {
"name": "glib2-0:2.56.1-11.el7_9.ppc64le",
"product_id": "glib2-0:2.56.1-11.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.1-11.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"product": {
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"product_id": "glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.1-11.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"product_id": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.1-11.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"product": {
"name": "glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"product_id": "glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.1-11.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.1-11.el7_9.ppc64le",
"product": {
"name": "glib2-static-0:2.56.1-11.el7_9.ppc64le",
"product_id": "glib2-static-0:2.56.1-11.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.1-11.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"product": {
"name": "glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"product_id": "glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.1-11.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-doc-0:2.56.1-11.el7_9.noarch",
"product": {
"name": "glib2-doc-0:2.56.1-11.el7_9.noarch",
"product_id": "glib2-doc-0:2.56.1-11.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.56.1-11.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-0:2.56.1-11.el7_9.i686"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-0:2.56.1-11.el7_9.s390"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-0:2.56.1-11.el7_9.src"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.i686"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.s390"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.56.1-11.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-doc-0:2.56.1-11.el7_9.noarch"
},
"product_reference": "glib2-doc-0:2.56.1-11.el7_9.noarch",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-fam-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-fam-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-fam-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-static-0:2.56.1-11.el7_9.i686"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-static-0:2.56.1-11.el7_9.s390"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-static-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-static-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-tests-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-tests-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-tests-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.i686"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.s390"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.src"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.i686"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.s390"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-devel-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.56.1-11.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-doc-0:2.56.1-11.el7_9.noarch"
},
"product_reference": "glib2-doc-0:2.56.1-11.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-fam-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-fam-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-fam-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.i686"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.s390"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-static-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.1-11.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64"
},
"product_reference": "glib2-tests-0:2.56.1-11.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.1-11.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.1-11.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.s390x"
},
"product_reference": "glib2-tests-0:2.56.1-11.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.1-11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.x86_64"
},
"product_reference": "glib2-tests-0:2.56.1-11.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:glib2-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.src",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-doc-0:2.56.1-11.el7_9.noarch",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.src",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-doc-0:2.56.1-11.el7_9.noarch",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T01:55:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:glib2-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.src",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-doc-0:2.56.1-11.el7_9.noarch",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.src",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-doc-0:2.56.1-11.el7_9.noarch",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1608"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"7Server-ELS:glib2-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.src",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-doc-0:2.56.1-11.el7_9.noarch",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.src",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-doc-0:2.56.1-11.el7_9.noarch",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:glib2-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.src",
"7Server-ELS:glib2-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-devel-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-doc-0:2.56.1-11.el7_9.noarch",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-fam-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.i686",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.s390",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-static-0:2.56.1-11.el7_9.x86_64",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.s390x",
"7Server-ELS:glib2-tests-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.src",
"7Server-optional-ELS:glib2-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-debuginfo-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-devel-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-doc-0:2.56.1-11.el7_9.noarch",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-fam-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.i686",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.s390",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-static-0:2.56.1-11.el7_9.x86_64",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.ppc64le",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.s390x",
"7Server-optional-ELS:glib2-tests-0:2.56.1-11.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:1624
Vulnerability from csaf_redhat - Published: 2026-02-02 01:49 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1624",
"url": "https://access.redhat.com/errata/RHSA-2026:1624"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1624.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:19+00:00",
"generator": {
"date": "2026-02-19T13:37:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1624",
"initial_release_date": "2026-02-02T01:49:21+00:00",
"revision_history": [
{
"date": "2026-02-02T01:49:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-02T01:49:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-158.el8_6.4.src",
"product": {
"name": "glib2-0:2.56.4-158.el8_6.4.src",
"product_id": "glib2-0:2.56.4-158.el8_6.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-158.el8_6.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-158.el8_6.4.i686",
"product": {
"name": "glib2-0:2.56.4-158.el8_6.4.i686",
"product_id": "glib2-0:2.56.4-158.el8_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-158.el8_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-158.el8_6.4.i686",
"product": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.i686",
"product_id": "glib2-devel-0:2.56.4-158.el8_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-158.el8_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"product": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"product_id": "glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-158.el8_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product_id": "glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-158.el8_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product_id": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-158.el8_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product_id": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-158.el8_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product_id": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-158.el8_6.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-158.el8_6.4.x86_64",
"product": {
"name": "glib2-0:2.56.4-158.el8_6.4.x86_64",
"product_id": "glib2-0:2.56.4-158.el8_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-158.el8_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"product": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"product_id": "glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-158.el8_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"product": {
"name": "glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"product_id": "glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-158.el8_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"product": {
"name": "glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"product_id": "glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-158.el8_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"product": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"product_id": "glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-158.el8_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product_id": "glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-158.el8_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-158.el8_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-158.el8_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-158.el8_6.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-158.el8_6.4.aarch64",
"product": {
"name": "glib2-0:2.56.4-158.el8_6.4.aarch64",
"product_id": "glib2-0:2.56.4-158.el8_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-158.el8_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-158.el8_6.4.aarch64",
"product": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.aarch64",
"product_id": "glib2-devel-0:2.56.4-158.el8_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-158.el8_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-158.el8_6.4.aarch64",
"product": {
"name": "glib2-fam-0:2.56.4-158.el8_6.4.aarch64",
"product_id": "glib2-fam-0:2.56.4-158.el8_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-158.el8_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-158.el8_6.4.aarch64",
"product": {
"name": "glib2-tests-0:2.56.4-158.el8_6.4.aarch64",
"product_id": "glib2-tests-0:2.56.4-158.el8_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-158.el8_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.aarch64",
"product": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.aarch64",
"product_id": "glib2-debugsource-0:2.56.4-158.el8_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-158.el8_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product_id": "glib2-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-158.el8_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-158.el8_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-158.el8_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-158.el8_6.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-158.el8_6.4.ppc64le",
"product": {
"name": "glib2-0:2.56.4-158.el8_6.4.ppc64le",
"product_id": "glib2-0:2.56.4-158.el8_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-158.el8_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-158.el8_6.4.ppc64le",
"product": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.ppc64le",
"product_id": "glib2-devel-0:2.56.4-158.el8_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-158.el8_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-158.el8_6.4.ppc64le",
"product": {
"name": "glib2-fam-0:2.56.4-158.el8_6.4.ppc64le",
"product_id": "glib2-fam-0:2.56.4-158.el8_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-158.el8_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-158.el8_6.4.ppc64le",
"product": {
"name": "glib2-tests-0:2.56.4-158.el8_6.4.ppc64le",
"product_id": "glib2-tests-0:2.56.4-158.el8_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-158.el8_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.ppc64le",
"product_id": "glib2-debugsource-0:2.56.4-158.el8_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-158.el8_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product_id": "glib2-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-158.el8_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-158.el8_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product_id": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-158.el8_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-158.el8_6.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-158.el8_6.4.s390x",
"product": {
"name": "glib2-0:2.56.4-158.el8_6.4.s390x",
"product_id": "glib2-0:2.56.4-158.el8_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-158.el8_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-158.el8_6.4.s390x",
"product": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.s390x",
"product_id": "glib2-devel-0:2.56.4-158.el8_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-158.el8_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-158.el8_6.4.s390x",
"product": {
"name": "glib2-fam-0:2.56.4-158.el8_6.4.s390x",
"product_id": "glib2-fam-0:2.56.4-158.el8_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-158.el8_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-158.el8_6.4.s390x",
"product": {
"name": "glib2-tests-0:2.56.4-158.el8_6.4.s390x",
"product_id": "glib2-tests-0:2.56.4-158.el8_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-158.el8_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.s390x",
"product": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.s390x",
"product_id": "glib2-debugsource-0:2.56.4-158.el8_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-158.el8_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product_id": "glib2-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-158.el8_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product_id": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-158.el8_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product_id": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-158.el8_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product_id": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-158.el8_6.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.src"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-debugsource-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-devel-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-devel-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-devel-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-fam-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-tests-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.aarch64"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.ppc64le"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.s390x"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.src"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.s390x"
},
"product_reference": "glib2-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.aarch64"
},
"product_reference": "glib2-debugsource-0:2.56.4-158.el8_6.4.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.56.4-158.el8_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.s390x"
},
"product_reference": "glib2-debugsource-0:2.56.4-158.el8_6.4.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.aarch64"
},
"product_reference": "glib2-devel-0:2.56.4-158.el8_6.4.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-devel-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.4-158.el8_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.s390x"
},
"product_reference": "glib2-devel-0:2.56.4-158.el8_6.4.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-158.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.aarch64"
},
"product_reference": "glib2-fam-0:2.56.4-158.el8_6.4.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-158.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.4-158.el8_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-158.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.s390x"
},
"product_reference": "glib2-fam-0:2.56.4-158.el8_6.4.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.aarch64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.ppc64le"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.s390x"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-158.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.aarch64"
},
"product_reference": "glib2-tests-0:2.56.4-158.el8_6.4.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-158.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.4-158.el8_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-158.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.s390x"
},
"product_reference": "glib2-tests-0:2.56.4-158.el8_6.4.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.src"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-debugsource-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-devel-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-devel-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-devel-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-fam-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-tests-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T01:49:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1624"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.AUS:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.E4S:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.aarch64",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.ppc64le",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.s390x",
"BaseOS-8.6.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.src",
"BaseOS-8.6.0.Z.TUS:glib2-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-debugsource-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-debugsource-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-devel-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-devel-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-fam-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-tests-0:2.56.4-158.el8_6.4.x86_64",
"BaseOS-8.6.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.i686",
"BaseOS-8.6.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-158.el8_6.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:0936
Vulnerability from csaf_redhat - Published: 2026-01-21 19:53 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0936",
"url": "https://access.redhat.com/errata/RHSA-2026:0936"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0936.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:10+00:00",
"generator": {
"date": "2026-02-19T13:37:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:0936",
"initial_release_date": "2026-01-21T19:53:19+00:00",
"revision_history": [
{
"date": "2026-01-21T19:53:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-21T19:53:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"product": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"product_id": "glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-18.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"product": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"product_id": "glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-18.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"product": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"product_id": "glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-18.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"product_id": "glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-18.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-18.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-18.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-18.el9_7.1.aarch64",
"product": {
"name": "glib2-0:2.68.4-18.el9_7.1.aarch64",
"product_id": "glib2-0:2.68.4-18.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-18.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"product": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"product_id": "glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-18.el9_7.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"product": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"product_id": "glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-18.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"product": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"product_id": "glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-18.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"product_id": "glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-18.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"product_id": "glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-18.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-18.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-18.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-18.el9_7.1.ppc64le",
"product": {
"name": "glib2-0:2.68.4-18.el9_7.1.ppc64le",
"product_id": "glib2-0:2.68.4-18.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-18.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"product": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"product_id": "glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-18.el9_7.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-18.el9_7.1.i686",
"product": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.i686",
"product_id": "glib2-devel-0:2.68.4-18.el9_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-18.el9_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"product": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"product_id": "glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-18.el9_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"product": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"product_id": "glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-18.el9_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"product_id": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-18.el9_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"product_id": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-18.el9_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-18.el9_7.1.i686",
"product": {
"name": "glib2-0:2.68.4-18.el9_7.1.i686",
"product_id": "glib2-0:2.68.4-18.el9_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-18.el9_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-18.el9_7.1.i686",
"product": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.i686",
"product_id": "glib2-static-0:2.68.4-18.el9_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-18.el9_7.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"product": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"product_id": "glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-18.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"product": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"product_id": "glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-18.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"product": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"product_id": "glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-18.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"product_id": "glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-18.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-18.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-18.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-18.el9_7.1.x86_64",
"product": {
"name": "glib2-0:2.68.4-18.el9_7.1.x86_64",
"product_id": "glib2-0:2.68.4-18.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-18.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"product": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"product_id": "glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-18.el9_7.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"product": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"product_id": "glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-18.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"product": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"product_id": "glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-18.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"product": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"product_id": "glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-18.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"product": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"product_id": "glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-18.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"product_id": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-18.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"product_id": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-18.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-18.el9_7.1.s390x",
"product": {
"name": "glib2-0:2.68.4-18.el9_7.1.s390x",
"product_id": "glib2-0:2.68.4-18.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-18.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-18.el9_7.1.s390x",
"product": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.s390x",
"product_id": "glib2-static-0:2.68.4-18.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-18.el9_7.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"product": {
"name": "glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"product_id": "glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.68.4-18.el9_7.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-18.el9_7.1.src",
"product": {
"name": "glib2-0:2.68.4-18.el9_7.1.src",
"product_id": "glib2-0:2.68.4-18.el9_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-18.el9_7.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-18.el9_7.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.src",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-18.el9_7.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.src",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-18.el9_7.1.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-21T19:53:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0936"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"BaseOS-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"BaseOS-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.src",
"CRB-9.7.0.Z.MAIN:glib2-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-debugsource-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-devel-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-devel-debuginfo-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-doc-0:2.68.4-18.el9_7.1.noarch",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-static-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-tests-0:2.68.4-18.el9_7.1.x86_64",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.aarch64",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.i686",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.ppc64le",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.s390x",
"CRB-9.7.0.Z.MAIN:glib2-tests-debuginfo-0:2.68.4-18.el9_7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:1625
Vulnerability from csaf_redhat - Published: 2026-02-02 01:53 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1625",
"url": "https://access.redhat.com/errata/RHSA-2026:1625"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1625.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:18+00:00",
"generator": {
"date": "2026-02-19T13:37:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1625",
"initial_release_date": "2026-02-02T01:53:11+00:00",
"revision_history": [
{
"date": "2026-02-02T01:53:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-02T01:53:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-164.el8_8.src",
"product": {
"name": "glib2-0:2.56.4-164.el8_8.src",
"product_id": "glib2-0:2.56.4-164.el8_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-164.el8_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-164.el8_8.ppc64le",
"product": {
"name": "glib2-0:2.56.4-164.el8_8.ppc64le",
"product_id": "glib2-0:2.56.4-164.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-164.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-164.el8_8.ppc64le",
"product": {
"name": "glib2-devel-0:2.56.4-164.el8_8.ppc64le",
"product_id": "glib2-devel-0:2.56.4-164.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-164.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-164.el8_8.ppc64le",
"product": {
"name": "glib2-fam-0:2.56.4-164.el8_8.ppc64le",
"product_id": "glib2-fam-0:2.56.4-164.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-164.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-164.el8_8.ppc64le",
"product": {
"name": "glib2-tests-0:2.56.4-164.el8_8.ppc64le",
"product_id": "glib2-tests-0:2.56.4-164.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-164.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-164.el8_8.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.56.4-164.el8_8.ppc64le",
"product_id": "glib2-debugsource-0:2.56.4-164.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-164.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product_id": "glib2-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-164.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-164.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product_id": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-164.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-164.el8_8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-164.el8_8.i686",
"product": {
"name": "glib2-0:2.56.4-164.el8_8.i686",
"product_id": "glib2-0:2.56.4-164.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-164.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-164.el8_8.i686",
"product": {
"name": "glib2-devel-0:2.56.4-164.el8_8.i686",
"product_id": "glib2-devel-0:2.56.4-164.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-164.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-164.el8_8.i686",
"product": {
"name": "glib2-debugsource-0:2.56.4-164.el8_8.i686",
"product_id": "glib2-debugsource-0:2.56.4-164.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-164.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"product": {
"name": "glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"product_id": "glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-164.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"product_id": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-164.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"product_id": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-164.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"product_id": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-164.el8_8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-164.el8_8.x86_64",
"product": {
"name": "glib2-0:2.56.4-164.el8_8.x86_64",
"product_id": "glib2-0:2.56.4-164.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-164.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-164.el8_8.x86_64",
"product": {
"name": "glib2-devel-0:2.56.4-164.el8_8.x86_64",
"product_id": "glib2-devel-0:2.56.4-164.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-164.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-164.el8_8.x86_64",
"product": {
"name": "glib2-fam-0:2.56.4-164.el8_8.x86_64",
"product_id": "glib2-fam-0:2.56.4-164.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-164.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-164.el8_8.x86_64",
"product": {
"name": "glib2-tests-0:2.56.4-164.el8_8.x86_64",
"product_id": "glib2-tests-0:2.56.4-164.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-164.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"product": {
"name": "glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"product_id": "glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-164.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product_id": "glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-164.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-164.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-164.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-164.el8_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-164.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.ppc64le"
},
"product_reference": "glib2-0:2.56.4-164.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-164.el8_8.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.src"
},
"product_reference": "glib2-0:2.56.4-164.el8_8.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-164.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-164.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.56.4-164.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-devel-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-164.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.4-164.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-164.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-fam-0:2.56.4-164.el8_8.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.4-164.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-fam-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.ppc64le"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-164.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-tests-0:2.56.4-164.el8_8.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.4-164.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-tests-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-164.el8_8.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.src"
},
"product_reference": "glib2-0:2.56.4-164.el8_8.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-debuginfo-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-debuginfo-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-debugsource-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-debugsource-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-devel-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-devel-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-devel-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-fam-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-tests-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.src",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-fam-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-fam-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-tests-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-tests-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.src",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-debugsource-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-devel-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-devel-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-fam-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-tests-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T01:53:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.src",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-fam-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-fam-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-tests-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-tests-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.src",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-debugsource-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-devel-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-devel-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-fam-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-tests-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1625"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.src",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-fam-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-fam-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-tests-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-tests-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.src",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-debugsource-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-devel-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-devel-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-fam-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-tests-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.src",
"BaseOS-8.8.0.Z.E4S:glib2-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-devel-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-fam-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-fam-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-tests-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-tests-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.src",
"BaseOS-8.8.0.Z.TUS:glib2-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-debugsource-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-debugsource-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-devel-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-devel-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-devel-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-fam-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-fam-debuginfo-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-tests-0:2.56.4-164.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-164.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:glib2-tests-debuginfo-0:2.56.4-164.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:1324
Vulnerability from csaf_redhat - Published: 2026-01-27 07:16 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1324",
"url": "https://access.redhat.com/errata/RHSA-2026:1324"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1324.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:05+00:00",
"generator": {
"date": "2026-02-19T13:37:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1324",
"initial_release_date": "2026-01-27T07:16:01+00:00",
"revision_history": [
{
"date": "2026-01-27T07:16:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-27T07:16:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-7.el9_2.4.src",
"product": {
"name": "glib2-0:2.68.4-7.el9_2.4.src",
"product_id": "glib2-0:2.68.4-7.el9_2.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-7.el9_2.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-7.el9_2.4.aarch64",
"product": {
"name": "glib2-0:2.68.4-7.el9_2.4.aarch64",
"product_id": "glib2-0:2.68.4-7.el9_2.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-7.el9_2.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"product": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"product_id": "glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-7.el9_2.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"product_id": "glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-7.el9_2.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-7.el9_2.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-7.el9_2.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"product": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"product_id": "glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-7.el9_2.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"product": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"product_id": "glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-7.el9_2.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-7.el9_2.4.ppc64le",
"product": {
"name": "glib2-0:2.68.4-7.el9_2.4.ppc64le",
"product_id": "glib2-0:2.68.4-7.el9_2.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-7.el9_2.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"product_id": "glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-7.el9_2.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"product_id": "glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-7.el9_2.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-7.el9_2.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-7.el9_2.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"product": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"product_id": "glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-7.el9_2.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"product": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"product_id": "glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-7.el9_2.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-7.el9_2.4.i686",
"product": {
"name": "glib2-0:2.68.4-7.el9_2.4.i686",
"product_id": "glib2-0:2.68.4-7.el9_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-7.el9_2.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"product": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"product_id": "glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-7.el9_2.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"product": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"product_id": "glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-7.el9_2.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"product_id": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-7.el9_2.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"product_id": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-7.el9_2.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-7.el9_2.4.i686",
"product": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.i686",
"product_id": "glib2-devel-0:2.68.4-7.el9_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-7.el9_2.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-7.el9_2.4.x86_64",
"product": {
"name": "glib2-0:2.68.4-7.el9_2.4.x86_64",
"product_id": "glib2-0:2.68.4-7.el9_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-7.el9_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"product": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"product_id": "glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-7.el9_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"product_id": "glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-7.el9_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-7.el9_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-7.el9_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"product": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"product_id": "glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-7.el9_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"product": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"product_id": "glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-7.el9_2.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-7.el9_2.4.s390x",
"product": {
"name": "glib2-0:2.68.4-7.el9_2.4.s390x",
"product_id": "glib2-0:2.68.4-7.el9_2.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-7.el9_2.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"product": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"product_id": "glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-7.el9_2.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"product": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"product_id": "glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-7.el9_2.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"product_id": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-7.el9_2.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"product_id": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-7.el9_2.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"product": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"product_id": "glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-7.el9_2.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"product": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"product_id": "glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-7.el9_2.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"product": {
"name": "glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"product_id": "glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.68.4-7.el9_2.4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.src"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-devel-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-7.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-doc-0:2.68.4-7.el9_2.4.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.src"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-devel-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-7.el9_2.4.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-doc-0:2.68.4-7.el9_2.4.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.src",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.src",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-27T07:16:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.src",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.src",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1324"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.src",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.src",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.src",
"AppStream-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"AppStream-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.src",
"BaseOS-9.2.0.Z.E4S:glib2-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-debugsource-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-devel-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-doc-0:2.68.4-7.el9_2.4.noarch",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-tests-0:2.68.4-7.el9_2.4.x86_64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.aarch64",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.i686",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.ppc64le",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.s390x",
"BaseOS-9.2.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-7.el9_2.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:1327
Vulnerability from csaf_redhat - Published: 2026-01-27 07:32 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1327",
"url": "https://access.redhat.com/errata/RHSA-2026:1327"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1327.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:06+00:00",
"generator": {
"date": "2026-02-19T13:37:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1327",
"initial_release_date": "2026-01-27T07:32:51+00:00",
"revision_history": [
{
"date": "2026-01-27T07:32:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-27T07:32:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"product": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"product_id": "glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.80.4-4.el10_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"product": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"product_id": "glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.80.4-4.el10_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"product": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"product_id": "glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.80.4-4.el10_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"product_id": "glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.80.4-4.el10_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.80.4-4.el10_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.80.4-4.el10_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.80.4-4.el10_0.8.aarch64",
"product": {
"name": "glib2-0:2.80.4-4.el10_0.8.aarch64",
"product_id": "glib2-0:2.80.4-4.el10_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.80.4-4.el10_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"product": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"product_id": "glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.80.4-4.el10_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"product": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"product_id": "glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.80.4-4.el10_0.8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"product": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"product_id": "glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.80.4-4.el10_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"product": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"product_id": "glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.80.4-4.el10_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"product_id": "glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.80.4-4.el10_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"product_id": "glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.80.4-4.el10_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.80.4-4.el10_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.80.4-4.el10_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.80.4-4.el10_0.8.ppc64le",
"product": {
"name": "glib2-0:2.80.4-4.el10_0.8.ppc64le",
"product_id": "glib2-0:2.80.4-4.el10_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.80.4-4.el10_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"product": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"product_id": "glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.80.4-4.el10_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"product": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"product_id": "glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.80.4-4.el10_0.8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"product": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"product_id": "glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.80.4-4.el10_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"product": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"product_id": "glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.80.4-4.el10_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"product": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"product_id": "glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.80.4-4.el10_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"product_id": "glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.80.4-4.el10_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.80.4-4.el10_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.80.4-4.el10_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.80.4-4.el10_0.8.x86_64",
"product": {
"name": "glib2-0:2.80.4-4.el10_0.8.x86_64",
"product_id": "glib2-0:2.80.4-4.el10_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.80.4-4.el10_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"product": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"product_id": "glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.80.4-4.el10_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"product": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"product_id": "glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.80.4-4.el10_0.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"product": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"product_id": "glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.80.4-4.el10_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"product": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"product_id": "glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.80.4-4.el10_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"product": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"product_id": "glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.80.4-4.el10_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"product": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"product_id": "glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.80.4-4.el10_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"product_id": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.80.4-4.el10_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"product_id": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.80.4-4.el10_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.80.4-4.el10_0.8.s390x",
"product": {
"name": "glib2-0:2.80.4-4.el10_0.8.s390x",
"product_id": "glib2-0:2.80.4-4.el10_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.80.4-4.el10_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"product": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"product_id": "glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.80.4-4.el10_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.80.4-4.el10_0.8.s390x",
"product": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.s390x",
"product_id": "glib2-static-0:2.80.4-4.el10_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.80.4-4.el10_0.8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.80.4-4.el10_0.8.src",
"product": {
"name": "glib2-0:2.80.4-4.el10_0.8.src",
"product_id": "glib2-0:2.80.4-4.el10_0.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.80.4-4.el10_0.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.src",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.src",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-27T07:32:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"AppStream-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"AppStream-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"BaseOS-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"BaseOS-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.src",
"CRB-10.0.Z.E2S:glib2-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-debugsource-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-devel-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-devel-debuginfo-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-doc-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-static-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-tests-0:2.80.4-4.el10_0.8.x86_64",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.aarch64",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.ppc64le",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.s390x",
"CRB-10.0.Z.E2S:glib2-tests-debuginfo-0:2.80.4-4.el10_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:2064
Vulnerability from csaf_redhat - Published: 2026-02-13 16:55 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.12.85 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container\nPlatform 4.12.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.12.85. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHBA-2026:2063\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.12/html/release_notes\n\nSecurity Fix(es):\n\nNone\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nAll OpenShift Container Platform 4.12 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.12/html-single/updating_clusters/index#updating-cluster-within-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2064",
"url": "https://access.redhat.com/errata/RHSA-2026:2064"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2064.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.12.85 bug fix and security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:28+00:00",
"generator": {
"date": "2026-02-19T13:37:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2064",
"initial_release_date": "2026-02-13T16:55:24+00:00",
"revision_history": [
{
"date": "2026-02-13T16:55:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-13T16:55:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.12::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-x86_64-412.86.202602021310-0",
"product": {
"name": "rhcos-x86_64-412.86.202602021310-0",
"product_id": "rhcos-x86_64-412.86.202602021310-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@412.86.202602021310?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-x86_64-412.86.202602021310-0 as a component of Red Hat OpenShift Container Platform 4.12",
"product_id": "8Base-RHOSE-4.12:rhcos-x86_64-412.86.202602021310-0"
},
"product_reference": "rhcos-x86_64-412.86.202602021310-0",
"relates_to_product_reference": "8Base-RHOSE-4.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.12:rhcos-x86_64-412.86.202602021310-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-13T16:55:24+00:00",
"details": "For OpenShift Container Platform 4.12 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.12/html/release_notes\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64 architecture. The image digest may be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\n The sha value for the release is as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:ff7d04b2684670422141a33da362cef8b0475505c458ff9a74564b37e97868a9\n\nAll OpenShift Container Platform 4.12 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.12/html-single/updating_clusters/index#updating-cluster-within-minor.",
"product_ids": [
"8Base-RHOSE-4.12:rhcos-x86_64-412.86.202602021310-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2064"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHOSE-4.12:rhcos-x86_64-412.86.202602021310-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.12:rhcos-x86_64-412.86.202602021310-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:2671
Vulnerability from csaf_redhat - Published: 2026-02-18 21:21 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.17.49 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.17.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.17.49. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/RHSA-2026:2670\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nSecurity Fix(es):\n\n* openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing (CVE-2025-15467)\n* libpng: LIBPNG out-of-bounds read in png_image_read_composite (CVE-2025-66293)\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2671",
"url": "https://access.redhat.com/errata/RHSA-2026:2671"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "2418711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418711"
},
{
"category": "external",
"summary": "2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2671.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.17.49 bug fix and security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:34+00:00",
"generator": {
"date": "2026-02-19T13:37:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2671",
"initial_release_date": "2026-02-18T21:21:57+00:00",
"revision_history": [
{
"date": "2026-02-18T21:21:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-18T21:21:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.17",
"product": {
"name": "Red Hat OpenShift Container Platform 4.17",
"product_id": "9Base-RHOSE-4.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.17::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-aarch64-417.94.202602090846-0",
"product": {
"name": "rhcos-aarch64-417.94.202602090846-0",
"product_id": "rhcos-aarch64-417.94.202602090846-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@417.94.202602090846?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-ppc64le-417.94.202602090846-0",
"product": {
"name": "rhcos-ppc64le-417.94.202602090846-0",
"product_id": "rhcos-ppc64le-417.94.202602090846-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@417.94.202602090846?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-s390x-417.94.202602090846-0",
"product": {
"name": "rhcos-s390x-417.94.202602090846-0",
"product_id": "rhcos-s390x-417.94.202602090846-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@417.94.202602090846?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-x86_64-417.94.202602090846-0",
"product": {
"name": "rhcos-x86_64-417.94.202602090846-0",
"product_id": "rhcos-x86_64-417.94.202602090846-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@417.94.202602090846?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-aarch64-417.94.202602090846-0 as a component of Red Hat OpenShift Container Platform 4.17",
"product_id": "9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0"
},
"product_reference": "rhcos-aarch64-417.94.202602090846-0",
"relates_to_product_reference": "9Base-RHOSE-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-ppc64le-417.94.202602090846-0 as a component of Red Hat OpenShift Container Platform 4.17",
"product_id": "9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0"
},
"product_reference": "rhcos-ppc64le-417.94.202602090846-0",
"relates_to_product_reference": "9Base-RHOSE-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-s390x-417.94.202602090846-0 as a component of Red Hat OpenShift Container Platform 4.17",
"product_id": "9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0"
},
"product_reference": "rhcos-s390x-417.94.202602090846-0",
"relates_to_product_reference": "9Base-RHOSE-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-x86_64-417.94.202602090846-0 as a component of Red Hat OpenShift Container Platform 4.17",
"product_id": "9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
},
"product_reference": "rhcos-x86_64-417.94.202602090846-0",
"relates_to_product_reference": "9Base-RHOSE-4.17"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T21:21:57+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:d1c2044e31dd213e8b67aa19f63a7bdb93e0424c3d6f932a66e7d1513a9ca1e2\n\n (For s390x architecture)\n The image digest is sha256:a5d268ec5655a0812c028e62007fbcfa0aad41c87f08d2e1e757cf877fa79780\n\n (For ppc64le architecture)\n The image digest is sha256:08795864ea6ef2033c33700005eb0f14ece2a1a2c0330b04eb2930aeae6e6c00\n\n (For aarch64 architecture)\n The image digest is sha256:6d5b7c9ef9f80ea739f79bd997755ac89182a097f1b58594c991442677915b2f\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2671"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T21:21:57+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:d1c2044e31dd213e8b67aa19f63a7bdb93e0424c3d6f932a66e7d1513a9ca1e2\n\n (For s390x architecture)\n The image digest is sha256:a5d268ec5655a0812c028e62007fbcfa0aad41c87f08d2e1e757cf877fa79780\n\n (For ppc64le architecture)\n The image digest is sha256:08795864ea6ef2033c33700005eb0f14ece2a1a2c0330b04eb2930aeae6e6c00\n\n (For aarch64 architecture)\n The image digest is sha256:6d5b7c9ef9f80ea739f79bd997755ac89182a097f1b58594c991442677915b2f\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2671"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-66293",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-03T21:00:59.956903+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418711"
}
],
"notes": [
{
"category": "description",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: LIBPNG out-of-bounds read in png_image_read_composite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important as it affects libpng, a widely used library for PNG image processing. The flaw is due to an out-of-bounds read in libpng\u2019s simplified API when handling specially crafted PNG images containing partial transparency and gamma correction data. Successful exploitation could result in information disclosure or cause application crashes in applications processing untrusted PNG content.\n\nFor `java-17-openjdk-headless` and `java-21-openjdk-headless`, while the affected code is present in the bundled sources, it is not exercised by these headless packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "RHBZ#2418711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418711"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1",
"url": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a",
"url": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/issues/764",
"url": "https://github.com/pnggroup/libpng/issues/764"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f"
}
],
"release_date": "2025-12-03T20:33:57.086000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T21:21:57+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:d1c2044e31dd213e8b67aa19f63a7bdb93e0424c3d6f932a66e7d1513a9ca1e2\n\n (For s390x architecture)\n The image digest is sha256:a5d268ec5655a0812c028e62007fbcfa0aad41c87f08d2e1e757cf877fa79780\n\n (For ppc64le architecture)\n The image digest is sha256:08795864ea6ef2033c33700005eb0f14ece2a1a2c0330b04eb2930aeae6e6c00\n\n (For aarch64 architecture)\n The image digest is sha256:6d5b7c9ef9f80ea739f79bd997755ac89182a097f1b58594c991442677915b2f\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2671"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202602090846-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202602090846-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libpng: LIBPNG out-of-bounds read in png_image_read_composite"
}
]
}
RHSA-2026:1652
Vulnerability from csaf_redhat - Published: 2026-02-02 02:51 - Updated: 2026-02-20 01:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new version of Red Hat build of Ceph Storage has been released",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 8.1.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1652",
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-5642",
"url": "https://access.redhat.com/security/cve/CVE-2024-5642"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13601",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-45582",
"url": "https://access.redhat.com/security/cve/CVE-2025-45582"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4598",
"url": "https://access.redhat.com/security/cve/CVE-2025-4598"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59375",
"url": "https://access.redhat.com/security/cve/CVE-2025-59375"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6069",
"url": "https://access.redhat.com/security/cve/CVE-2025-6069"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6075",
"url": "https://access.redhat.com/security/cve/CVE-2025-6075"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61984",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61985",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68973",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6965",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-8291",
"url": "https://access.redhat.com/security/cve/CVE-2025-8291"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9230",
"url": "https://access.redhat.com/security/cve/CVE-2025-9230"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9714",
"url": "https://access.redhat.com/security/cve/CVE-2025-9714"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/",
"url": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1652.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ceph Storage",
"tracking": {
"current_release_date": "2026-02-20T01:01:56+00:00",
"generator": {
"date": "2026-02-20T01:01:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1652",
"initial_release_date": "2026-02-02T02:51:27+00:00",
"revision_history": [
{
"date": "2026-02-02T02:51:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-02T02:51:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-20T01:01:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ceph Storage 8",
"product": {
"name": "Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ceph_storage:8::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ceph Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768915405"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768907469"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768903190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768902743"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3A9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1769512383"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768903749"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Aab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768915405"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3Aa5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768907469"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768903190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768902743"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Ac1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1769512383"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768903749"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768915405"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768907469"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3Aa45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768903190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768902743"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3A09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1769512383"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768903749"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Ab52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768915405"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3Af8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768907469"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3Afa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768903190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Ab97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768902743"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3A97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1769512383"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1768903749"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5642",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-06-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294682"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Python/CPython that does not disallow configuring an empty list (\"[]\") for SSLContext.set_npn_protocols(), which is an invalid value for the underlying OpenSSL API. This issue results in a buffer over-read when NPN is used. See CVE -2024-5535 for OpenSSL for more information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated with a Low severity due to NPN not being widely used and specifying an empty list is likely uncommon in practice. Typically, a protocol name would be configured.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-5642"
},
{
"category": "external",
"summary": "RHBZ#2294682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294682"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5642",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5642"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/"
}
],
"release_date": "2024-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 2.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used"
},
{
"cve": "CVE-2025-4598",
"cwe": {
"id": "CWE-364",
"name": "Signal Handler Race Condition"
},
"discovery_date": "2025-05-29T19:04:54.578000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2369242"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original\u0027s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner\u0027s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original\u0027s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was rated as having a severity of Moderate due to the complexity to exploit this flaw. The attacker needs to setup a way to win the race condition and have an unprivileged local account to successfully exploit this vulnerability.\n\nBy default Red Hat Enterprise Linux 8 doesn\u0027t allow systemd-coredump to create dumps of SUID programs as the /proc/sys/fs/suid_dumpable is set to 0, disabling by default this capability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4598"
},
{
"category": "external",
"summary": "RHBZ#2369242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4598"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/29/3",
"url": "https://www.openwall.com/lists/oss-security/2025/05/29/3"
}
],
"release_date": "2025-05-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "This issue can be mitigated by disabling the capability of the system to generate a coredump for SUID binaries. The perform that, the following command can be ran as `root` user:\n\n~~~\necho 0 \u003e /proc/sys/fs/suid_dumpable\n~~~\n\nWhile this mitigates this vulnerability while it\u0027s not possible to update the systemd package, it disables the capability of analyzing crashes for such binaries.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump"
},
{
"cve": "CVE-2025-6069",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2025-06-17T14:00:45.339399+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373234"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) vulnerability has been discovered in Python\u0027s html.parser.HTMLParser class. When processing specially malformed HTML input, the parsing runtime can become quadratic with respect to the input size. This significantly increased processing time can lead to excessive resource consumption, ultimately causing a denial-of-service condition in applications that rely on this parser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: Python HTMLParser quadratic complexity",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6069"
},
{
"category": "external",
"summary": "RHBZ#2373234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373234"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6069",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6069"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949",
"url": "https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41",
"url": "https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b",
"url": "https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135462",
"url": "https://github.com/python/cpython/issues/135462"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135464",
"url": "https://github.com/python/cpython/pull/135464"
}
],
"release_date": "2025-06-17T13:39:46.058000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: Python HTMLParser quadratic complexity"
},
{
"cve": "CVE-2025-6075",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-31T17:01:47.052517+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408891"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in Python\u2019s os.path.expandvars() function that can cause performance degradation. When processing specially crafted, user-controlled input with nested environment variable patterns, the function exhibits quadratic time complexity, potentially leading to excessive CPU usage and denial of service (DoS) conditions. No code execution or data exposure occurs, so the impact is limited to performance slowdown.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Quadratic complexity in os.path.expandvars() with user-controlled template",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low rather than Moderate because it only causes a performance inefficiency without affecting code execution, data integrity, or confidentiality. The flaw lies in the algorithmic complexity of os.path.expandvars(), which can become quadratic when processing crafted input containing repetitive or nested environment variable references. Exploitation requires the attacker to control the input string passed to this function, which is uncommon in secure applications. Moreover, the impact is limited to increased CPU utilization and potential slowdown, not system compromise or data manipulation. Since the issue does not introduce memory corruption, privilege escalation, or information disclosure risks, its overall impact scope and exploitability are minimal, justifying a Low severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6075"
},
{
"category": "external",
"summary": "RHBZ#2408891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408891"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6075",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6075"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/136065",
"url": "https://github.com/python/cpython/issues/136065"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/"
}
],
"release_date": "2025-10-31T16:41:34.983000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python: Quadratic complexity in os.path.expandvars() with user-controlled template"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL",
"url": "https://www.oracle.com/security-alerts/cpujan2026.html#AppendixMSQL"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"cve": "CVE-2025-8291",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2025-10-07T19:01:23.599055+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402342"
}
],
"notes": [
{
"category": "description",
"text": "The \u0027zipfile\u0027 module would not check the validity of the ZIP64 End of\nCentral Directory (EOCD) Locator record offset value would not be used to\nlocate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be\nassumed to be the previous record in the ZIP archive. This could be abused\nto create ZIP archives that are handled differently by the \u0027zipfile\u0027 module\ncompared to other ZIP implementations.\n\n\nRemediation maintains this behavior, but checks that the offset specified\nin the ZIP64 EOCD Locator record matches the expected value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-8291"
},
{
"category": "external",
"summary": "RHBZ#2402342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-8291",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8291"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267",
"url": "https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6",
"url": "https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/139700",
"url": "https://github.com/python/cpython/issues/139700"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/139702",
"url": "https://github.com/python/cpython/pull/139702"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/"
}
],
"release_date": "2025-10-07T18:10:05.908000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked"
},
{
"cve": "CVE-2025-9230",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-09-17T12:15:34.387000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396054"
}
],
"notes": [
{
"category": "description",
"text": "Issue summary: An application trying to decrypt CMS messages encrypted using\npassword based encryption can trigger an out-of-bounds read and write.\n\nImpact summary: This out-of-bounds read may trigger a crash which leads to\nDenial of Service for an application. The out-of-bounds write can cause\na memory corruption which can have various consequences including\na Denial of Service or Execution of attacker-supplied code.\n\nAlthough the consequences of a successful exploit of this vulnerability\ncould be severe, the probability that the attacker would be able to\nperform it is low. Besides, password based (PWRI) encryption support in CMS\nmessages is very rarely used. For that reason the issue was assessed as\nModerate severity according to our Security Policy.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Out-of-bounds read \u0026 write in RFC 3211 KEK Unwrap",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability was rated as Moderate because, while the potential impact includes an application level denial of service and possible arbitrary code execution, successful exploitation is considered unlikely due to the high attack complexity and the fact that password-based CMS encryption (PWRI) is rarely used in real-world deployments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9230"
},
{
"category": "external",
"summary": "RHBZ#2396054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396054"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9230"
}
],
"release_date": "2025-09-30T23:59:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Out-of-bounds read \u0026 write in RFC 3211 KEK Unwrap"
},
{
"cve": "CVE-2025-9714",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"discovery_date": "2025-09-02T13:03:56.452000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392605"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxstl/libxml2. The \u0027exsltDynMapFunction\u0027 function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling \u0027dyn:map()\u0027, leading to stack exhaustion and a local denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxslt: libxml2: Inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No evidence was found for arbitrary memory corruption through this flaw, limiting its impact to Availability only, and reducing its severity to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9714"
},
{
"category": "external",
"summary": "RHBZ#2392605",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392605"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9714",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9714"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/148",
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/148"
}
],
"release_date": "2025-09-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "The impact of this flaw may be reduced by setting strict resource limits to the stack size of processes at the operational system level. This can be achieved either through the \u0027ulimit\u0027 shell built-in or the \u0027limits.conf\u0027 file.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxslt: libxml2: Inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c"
},
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
},
{
"cve": "CVE-2025-45582",
"cwe": {
"id": "CWE-24",
"name": "Path Traversal: \u0027../filedir\u0027"
},
"discovery_date": "2025-07-11T17:00:47.340822+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2379592"
}
],
"notes": [
{
"category": "description",
"text": "A relative path traversal flaw was found in the gnu tar utility. When archives with relative paths are extracted without the \u2018--keep-old-files\u2019 (\u2018-k\u2019), the extraction process may overwrite existing files that the current user has access to. The server may be impacted if these files are critical to the operation of some service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tar: Tar path traversal",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-45582"
},
{
"category": "external",
"summary": "RHBZ#2379592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379592"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-45582",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45582"
},
{
"category": "external",
"summary": "https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md",
"url": "https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md"
},
{
"category": "external",
"summary": "https://www.gnu.org/software/tar/",
"url": "https://www.gnu.org/software/tar/"
},
{
"category": "external",
"summary": "https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity",
"url": "https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity"
}
],
"release_date": "2025-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tar: Tar path traversal"
},
{
"cve": "CVE-2025-59375",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-15T03:00:59.775098+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395108"
}
],
"notes": [
{
"category": "description",
"text": "A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is Important rather than Critical because, while it allows for significant resource exhaustion leading to denial-of-service (DoS), it does not enable arbitrary code execution, data leakage, or privilege escalation. The vulnerability stems from an uncontrolled memory amplification behavior in libexpat\u2019s parser, where a relatively small XML payload can cause disproportionately large heap allocations. However, the flaw is limited in scope to service disruption and requires the attacker to submit a crafted XML document\u2014something that can be mitigated with proper input validation and memory usage limits. Therefore, while the exploitability is high, the impact is confined to availability, not confidentiality or integrity, making it a high-severity but not critical flaw.\n\nIn Firefox and Thunderbird, where libexpat is a transitive userspace dependency, exploitation usually just crashes the application (app-level DoS), so it is classify as Moderate instead of Important.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59375"
},
{
"category": "external",
"summary": "RHBZ#2395108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395108"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59375"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74",
"url": "https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/1018",
"url": "https://github.com/libexpat/libexpat/issues/1018"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/1034",
"url": "https://github.com/libexpat/libexpat/pull/1034"
},
{
"category": "external",
"summary": "https://issues.oss-fuzz.com/issues/439133977",
"url": "https://issues.oss-fuzz.com/issues/439133977"
}
],
"release_date": "2025-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "To mitigate the issue, limit XML input size and complexity before parsing, and avoid accepting compressed or deeply nested XML. Use OS-level resource controls (like ulimit or setrlimit()) to cap memory usage, or run the parser in a sandboxed or isolated process with strict memory and CPU limits. This helps prevent denial-of-service by containing excessive resource consumption.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing"
},
{
"cve": "CVE-2025-61984",
"cwe": {
"id": "CWE-159",
"name": "Improper Handling of Invalid Use of Special Elements"
},
"discovery_date": "2025-10-06T19:01:13.449665+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401960"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nThe issue occurs only when a ProxyCommand is configured and the SSH client handles a username containing control characters from an untrusted source, such as script-generated input or expanded configuration values.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61984"
},
{
"category": "external",
"summary": "RHBZ#2401960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61984"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand"
},
{
"cve": "CVE-2025-61985",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2025-10-06T19:01:16.841946+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401962"
}
],
"notes": [
{
"category": "description",
"text": "ssh in OpenSSH before 10.1 allows the \u0027\\0\u0027 character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is MODERATE because it is a critical component used across many Red Hat products.\nExploiting this vulnerability would require a specific configuration where ProxyCommand is enabled and the SSH client processes an untrusted ssh:// URI containing null bytes. Under these conditions, the command parser may misinterpret the URI and execute unintended shell commands.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61985"
},
{
"category": "external",
"summary": "RHBZ#2401962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401962"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61985"
},
{
"category": "external",
"summary": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2",
"url": "https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2"
},
{
"category": "external",
"summary": "https://www.openssh.com/releasenotes.html#10.1p1",
"url": "https://www.openssh.com/releasenotes.html#10.1p1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/10/06/1",
"url": "https://www.openwall.com/lists/oss-security/2025/10/06/1"
}
],
"release_date": "2025-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-68973",
"cwe": {
"id": "CWE-675",
"name": "Multiple Operations on Resource in Single-Operation Context"
},
"discovery_date": "2025-12-28T17:00:44.161022+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425966"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in GnuPG\u0027s `armor_filter` function allows an attacker with local access to provide crafted input, potentially leading to information disclosure and arbitrary code execution due to an out-of-bounds write. Exploitation requires high attack complexity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "RHBZ#2425966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306",
"url": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9",
"url": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9"
},
{
"category": "external",
"summary": "https://gpg.fail/memcpy",
"url": "https://gpg.fail/memcpy"
},
{
"category": "external",
"summary": "https://news.ycombinator.com/item?id=46403200",
"url": "https://news.ycombinator.com/item?id=46403200"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/12/28/5",
"url": "https://www.openwall.com/lists/oss-security/2025/12/28/5"
}
],
"release_date": "2025-12-28T16:19:11.019000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid processing untrusted or unverified input with GnuPG. Exercise caution when handling GnuPG-encrypted or signed data from unknown or suspicious sources, as specially crafted input could trigger the vulnerability. This operational control reduces the attack surface by limiting exposure to malicious data.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T02:51:27+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:2b5cf457f26d63afad72ab44cdc4422fb9fddb69394924d3b91c0ea5a769c180_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:907dc2b4f568b4c03c88c46ada8cfbc93b695499be6284ed6a27b04ddd01e6b9_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:ab6890d8ec728ce45cdcaf794f3589fcd9fc994d34e409abb7daa7e7b7b7bab5_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b52ec296c418fa881b0e95ed15ab2042f563f805e0fddb959456ca4a8bc3c934_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:50ef4035820e9678036be404f34182b993185162861fa7812f1a50ce5a12afd1_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9bd6c2e38c83c0298983c0194ee5e0700f925db68595e415554d39060686492e_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:a45576c219dbb118701238cbb13f9f0d59e2c1f141ebd7fb40164d9aef5bc143_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:fa90f5711868742cdb5d8b9288150bdf6c190756c021f5b6c4a4283d97b260c1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:09aaeba975aa74bdf95d63e5619c0cabb1cd9e1410aa34e7f8ecf24a5e291d1a_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:97a60239048123bc963d7c9ac2ad85caa6a254759e44c15f173ca12ea51e4719_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:9e4f3ffb68eae556a6d34426903430173e4563eea3ea5d6720ce9b5b43c2dbda_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c1c3e3e46bb57c2c99378b7336aa2c2015b7279dcb3df7fdccc8c3dee1522ba6_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2f0246de4436b3da81abbb1b4335f9b6ea1c2b258110d17ec839996fb5442413_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:660918f5f35b92f89cc172a37d07020874ce4a28e6b03ddc715e999594cfbffd_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:a5bf40d4c25c2fc20e141421265c890d5eca0db43fad9b8d74bef206445d4a4d_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:f8aad8047ae755ffd97d68a7cd2894ee1e454f87531f5cce75130b2ed32a695e_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:0329153c21720eeaea09eb6e2a1e7882b70c01109df8d9ff921c31e66420500e_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6926fe9ec272c61350c8f90282d69c6da8c2e07255172a36a879f7c5b20d8b6b_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:80da04b7f5201a853254479a1063a37fc2c15955011996a81360e7f7cf0c29eb_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:b97bb92014a6a4cbd85c0324273e12c534c3a1809a1da1b3d2b5660b50f45320_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:31df4eb32846b4fb60838ad4f10aee1558e52312b69fb58bf128238406de0681_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:4053cae7e54ff720df9fa3eee654ba8bd91a367d51bb5075f95a1612dbca86a7_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:53c686b1767d342e5c8a5ff112b0c53db9707394fd7c7ae63b2a11ef1b3bf20d_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6389bd532d276b37efaad5a37245699d8e055d81c4be4b30907d5a8e1ea6bc80_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
}
]
}
RHSA-2026:0975
Vulnerability from csaf_redhat - Published: 2026-01-22 07:41 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0975",
"url": "https://access.redhat.com/errata/RHSA-2026:0975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0975.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:10+00:00",
"generator": {
"date": "2026-02-19T13:37:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:0975",
"initial_release_date": "2026-01-22T07:41:11+00:00",
"revision_history": [
{
"date": "2026-01-22T07:41:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-22T07:41:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"product": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"product_id": "glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.80.4-10.el10_1.12?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"product": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"product_id": "glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.80.4-10.el10_1.12?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"product": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"product_id": "glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.80.4-10.el10_1.12?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"product_id": "glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.80.4-10.el10_1.12?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.80.4-10.el10_1.12?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.80.4-10.el10_1.12?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.80.4-10.el10_1.12.aarch64",
"product": {
"name": "glib2-0:2.80.4-10.el10_1.12.aarch64",
"product_id": "glib2-0:2.80.4-10.el10_1.12.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.80.4-10.el10_1.12?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"product": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"product_id": "glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.80.4-10.el10_1.12?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"product": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"product_id": "glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.80.4-10.el10_1.12?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"product": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"product_id": "glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.80.4-10.el10_1.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"product": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"product_id": "glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.80.4-10.el10_1.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"product_id": "glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.80.4-10.el10_1.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"product_id": "glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.80.4-10.el10_1.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.80.4-10.el10_1.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.80.4-10.el10_1.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.80.4-10.el10_1.12.ppc64le",
"product": {
"name": "glib2-0:2.80.4-10.el10_1.12.ppc64le",
"product_id": "glib2-0:2.80.4-10.el10_1.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.80.4-10.el10_1.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"product": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"product_id": "glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.80.4-10.el10_1.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"product": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"product_id": "glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.80.4-10.el10_1.12?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"product": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"product_id": "glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.80.4-10.el10_1.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"product": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"product_id": "glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.80.4-10.el10_1.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"product": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"product_id": "glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.80.4-10.el10_1.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"product_id": "glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.80.4-10.el10_1.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.80.4-10.el10_1.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.80.4-10.el10_1.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.80.4-10.el10_1.12.x86_64",
"product": {
"name": "glib2-0:2.80.4-10.el10_1.12.x86_64",
"product_id": "glib2-0:2.80.4-10.el10_1.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.80.4-10.el10_1.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"product": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"product_id": "glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.80.4-10.el10_1.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"product": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"product_id": "glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.80.4-10.el10_1.12?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"product": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"product_id": "glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.80.4-10.el10_1.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"product": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"product_id": "glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.80.4-10.el10_1.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"product": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"product_id": "glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.80.4-10.el10_1.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"product": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"product_id": "glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.80.4-10.el10_1.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"product_id": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.80.4-10.el10_1.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"product_id": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.80.4-10.el10_1.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.80.4-10.el10_1.12.s390x",
"product": {
"name": "glib2-0:2.80.4-10.el10_1.12.s390x",
"product_id": "glib2-0:2.80.4-10.el10_1.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.80.4-10.el10_1.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"product": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"product_id": "glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.80.4-10.el10_1.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.80.4-10.el10_1.12.s390x",
"product": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.s390x",
"product_id": "glib2-static-0:2.80.4-10.el10_1.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.80.4-10.el10_1.12?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.80.4-10.el10_1.12.src",
"product": {
"name": "glib2-0:2.80.4-10.el10_1.12.src",
"product_id": "glib2-0:2.80.4-10.el10_1.12.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.80.4-10.el10_1.12?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.src",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T07:41:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"AppStream-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"AppStream-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"BaseOS-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"BaseOS-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.src",
"CRB-10.1.Z:glib2-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-debugsource-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-devel-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-devel-debuginfo-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-doc-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-static-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-tests-0:2.80.4-10.el10_1.12.x86_64",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.aarch64",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.ppc64le",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.s390x",
"CRB-10.1.Z:glib2-tests-debuginfo-0:2.80.4-10.el10_1.12.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:2659
Vulnerability from csaf_redhat - Published: 2026-02-18 13:07 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.16.57 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.16.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.16.57. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/RHSA-2026:2658\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html/release_notes/\n\nSecurity Fix(es):\n\n* openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing (CVE-2025-15467)\n* libpng: LIBPNG out-of-bounds read in png_image_read_composite (CVE-2025-66293)\n* glib: Integer overflow in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.16 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2659",
"url": "https://access.redhat.com/errata/RHSA-2026:2659"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "2418711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418711"
},
{
"category": "external",
"summary": "2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2659.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.16.57 bug fix and security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:33+00:00",
"generator": {
"date": "2026-02-19T13:37:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2659",
"initial_release_date": "2026-02-18T13:07:30+00:00",
"revision_history": [
{
"date": "2026-02-18T13:07:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-18T13:07:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.16",
"product": {
"name": "Red Hat OpenShift Container Platform 4.16",
"product_id": "9Base-RHOSE-4.16",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.16::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-aarch64-416.94.202602101357-0",
"product": {
"name": "rhcos-aarch64-416.94.202602101357-0",
"product_id": "rhcos-aarch64-416.94.202602101357-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@416.94.202602101357?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-ppc64le-416.94.202602101357-0",
"product": {
"name": "rhcos-ppc64le-416.94.202602101357-0",
"product_id": "rhcos-ppc64le-416.94.202602101357-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@416.94.202602101357?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-s390x-416.94.202602101357-0",
"product": {
"name": "rhcos-s390x-416.94.202602101357-0",
"product_id": "rhcos-s390x-416.94.202602101357-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@416.94.202602101357?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-x86_64-416.94.202602101357-0",
"product": {
"name": "rhcos-x86_64-416.94.202602101357-0",
"product_id": "rhcos-x86_64-416.94.202602101357-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@416.94.202602101357?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-aarch64-416.94.202602101357-0 as a component of Red Hat OpenShift Container Platform 4.16",
"product_id": "9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0"
},
"product_reference": "rhcos-aarch64-416.94.202602101357-0",
"relates_to_product_reference": "9Base-RHOSE-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-ppc64le-416.94.202602101357-0 as a component of Red Hat OpenShift Container Platform 4.16",
"product_id": "9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0"
},
"product_reference": "rhcos-ppc64le-416.94.202602101357-0",
"relates_to_product_reference": "9Base-RHOSE-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-s390x-416.94.202602101357-0 as a component of Red Hat OpenShift Container Platform 4.16",
"product_id": "9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0"
},
"product_reference": "rhcos-s390x-416.94.202602101357-0",
"relates_to_product_reference": "9Base-RHOSE-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-x86_64-416.94.202602101357-0 as a component of Red Hat OpenShift Container Platform 4.16",
"product_id": "9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
},
"product_reference": "rhcos-x86_64-416.94.202602101357-0",
"relates_to_product_reference": "9Base-RHOSE-4.16"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T13:07:30+00:00",
"details": "For OpenShift Container Platform 4.16 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:9be78983e01f2fd4a8652543a3a997923818f2d62e0968f15ff30d0084233b49\n\n (For s390x architecture)\n The image digest is sha256:62344078c5d27a8b4a230cb69f800be2e7bace1ba0683ad48c219be850549abc\n\n (For ppc64le architecture)\n The image digest is sha256:8dc7e7317bb32a320281248503bda3dea8262c671d99acb75b83eda1e6b3695e\n\n (For aarch64 architecture)\n The image digest is sha256:e179e1d1ed72417286499f8f075a00c43ef9ddb96de9bf0234dd3a28e448c5f1\n\nAll OpenShift Container Platform 4.16 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2659"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T13:07:30+00:00",
"details": "For OpenShift Container Platform 4.16 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:9be78983e01f2fd4a8652543a3a997923818f2d62e0968f15ff30d0084233b49\n\n (For s390x architecture)\n The image digest is sha256:62344078c5d27a8b4a230cb69f800be2e7bace1ba0683ad48c219be850549abc\n\n (For ppc64le architecture)\n The image digest is sha256:8dc7e7317bb32a320281248503bda3dea8262c671d99acb75b83eda1e6b3695e\n\n (For aarch64 architecture)\n The image digest is sha256:e179e1d1ed72417286499f8f075a00c43ef9ddb96de9bf0234dd3a28e448c5f1\n\nAll OpenShift Container Platform 4.16 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2659"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-66293",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-03T21:00:59.956903+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418711"
}
],
"notes": [
{
"category": "description",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: LIBPNG out-of-bounds read in png_image_read_composite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important as it affects libpng, a widely used library for PNG image processing. The flaw is due to an out-of-bounds read in libpng\u2019s simplified API when handling specially crafted PNG images containing partial transparency and gamma correction data. Successful exploitation could result in information disclosure or cause application crashes in applications processing untrusted PNG content.\n\nFor `java-17-openjdk-headless` and `java-21-openjdk-headless`, while the affected code is present in the bundled sources, it is not exercised by these headless packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "RHBZ#2418711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418711"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66293"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1",
"url": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a",
"url": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/issues/764",
"url": "https://github.com/pnggroup/libpng/issues/764"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f"
}
],
"release_date": "2025-12-03T20:33:57.086000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T13:07:30+00:00",
"details": "For OpenShift Container Platform 4.16 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:9be78983e01f2fd4a8652543a3a997923818f2d62e0968f15ff30d0084233b49\n\n (For s390x architecture)\n The image digest is sha256:62344078c5d27a8b4a230cb69f800be2e7bace1ba0683ad48c219be850549abc\n\n (For ppc64le architecture)\n The image digest is sha256:8dc7e7317bb32a320281248503bda3dea8262c671d99acb75b83eda1e6b3695e\n\n (For aarch64 architecture)\n The image digest is sha256:e179e1d1ed72417286499f8f075a00c43ef9ddb96de9bf0234dd3a28e448c5f1\n\nAll OpenShift Container Platform 4.16 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2659"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.16:rhcos-aarch64-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-ppc64le-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-s390x-416.94.202602101357-0",
"9Base-RHOSE-4.16:rhcos-x86_64-416.94.202602101357-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libpng: LIBPNG out-of-bounds read in png_image_read_composite"
}
]
}
RHSA-2026:1736
Vulnerability from csaf_redhat - Published: 2026-02-02 17:31 - Updated: 2026-02-20 01:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A Subscription Management tool for finding and reporting Red Hat product usage",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Discovery, also known as Discovery, is an inspection and reporting tool that finds,\nidentifies, and reports environment data, or facts, such as the number of physical and virtual\nsystems on a network, their operating systems, and relevant configuration data stored within\nthem. Discovery also identifies and reports more detailed facts for some versions of key\nRed Hat packages and products that it finds in the network.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1736",
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-11187",
"url": "https://access.redhat.com/security/cve/CVE-2025-11187"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12084",
"url": "https://access.redhat.com/security/cve/CVE-2025-12084"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12818",
"url": "https://access.redhat.com/security/cve/CVE-2025-12818"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13601",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13836",
"url": "https://access.redhat.com/security/cve/CVE-2025-13836"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15467",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15468",
"url": "https://access.redhat.com/security/cve/CVE-2025-15468"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15469",
"url": "https://access.redhat.com/security/cve/CVE-2025-15469"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66199",
"url": "https://access.redhat.com/security/cve/CVE-2025-66199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68160",
"url": "https://access.redhat.com/security/cve/CVE-2025-68160"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68973",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69418",
"url": "https://access.redhat.com/security/cve/CVE-2025-69418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69419",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69420",
"url": "https://access.redhat.com/security/cve/CVE-2025-69420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-69421",
"url": "https://access.redhat.com/security/cve/CVE-2025-69421"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9086",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22795",
"url": "https://access.redhat.com/security/cve/CVE-2026-22795"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22796",
"url": "https://access.redhat.com/security/cve/CVE-2026-22796"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery",
"url": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1736.json"
}
],
"title": "Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage",
"tracking": {
"current_release_date": "2026-02-20T01:02:04+00:00",
"generator": {
"date": "2026-02-20T01:02:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1736",
"initial_release_date": "2026-02-02T17:31:06+00:00",
"revision_history": [
{
"date": "2026-02-02T17:31:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-02T17:31:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-20T01:02:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Discovery 2",
"product": {
"name": "Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:discovery:2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Discovery"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3Ad4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1769104765"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1769111774"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3A519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1769104765"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1769111774"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-09-12T06:01:02.244669+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394750"
}
],
"notes": [
{
"category": "description",
"text": "1. A cookie is set using the `secure` keyword for `https://target` \n 2. curl is redirected to or otherwise made to speak with `http://target` (same \n hostname, but using clear text HTTP) using the same cookie set \n 3. The same cookie name is set - but with just a slash as path (`path=\\\"/\\\",`).\n Since this site is not secure, the cookie *should* just be ignored.\n4. A bug in the path comparison logic makes curl read outside a heap buffer\n boundary\n\nThe bug either causes a crash or it potentially makes the comparison come to\nthe wrong conclusion and lets the clear-text site override the contents of the\nsecure cookie, contrary to expectations and depending on the memory contents\nimmediately following the single-byte allocation that holds the path.\n\nThe presumed and correct behavior would be to plainly ignore the second set of\nthe cookie since it was already set as secure on a secure host so overriding\nit on an insecure host should not be okay.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: libcurl: Curl out of bounds read for cookie path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9086"
},
{
"category": "external",
"summary": "RHBZ#2394750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.html",
"url": "https://curl.se/docs/CVE-2025-9086.html"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2025-9086.json",
"url": "https://curl.se/docs/CVE-2025-9086.json"
},
{
"category": "external",
"summary": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6",
"url": "https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3294999",
"url": "https://hackerone.com/reports/3294999"
}
],
"release_date": "2025-09-12T05:10:03.815000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: libcurl: Curl out of bounds read for cookie path"
},
{
"cve": "CVE-2025-11187",
"cwe": {
"id": "CWE-233",
"name": "Improper Handling of Parameters"
},
"discovery_date": "2026-01-16T14:21:50.559000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430375"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When an application processes a maliciously crafted PKCS#12 file, an attacker can exploit a stack buffer overflow or a NULL pointer dereference. This can lead to a denial of service (DoS) by crashing the application, and in some cases, may enable arbitrary code execution. The vulnerability arises from the lack of validation for PBKDF2 salt and keylength parameters within the PKCS#12 file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. It affects OpenSSL versions 3.6, 3.5, and 3.4, where improper validation of PBMAC1 parameters in PKCS#12 MAC verification can lead to a stack buffer overflow or NULL pointer dereference. Exploitation requires an application to process a maliciously crafted PKCS#12 file, which is uncommon as these files are typically trusted. OpenSSL versions 3.3, 3.0, 1.1.1, and 1.0.2 are not affected as they do not support PBMAC1 in PKCS#12.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-11187"
},
{
"category": "external",
"summary": "RHBZ#2430375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-11187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11187"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid processing untrusted PKCS#12 files. Applications should only handle PKCS#12 files from trusted sources, as these files are typically used for storing private keys and are expected to be secure.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file"
},
{
"cve": "CVE-2025-12084",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-03T19:01:03.489250+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418655"
}
],
"notes": [
{
"category": "description",
"text": "When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products as it can lead to a denial of service. The flaw exists in the `xml.dom.minidom` module of cpython, where a quadratic algorithm in methods like `appendChild()` can be triggered when processing excessively nested XML documents. When successfully exploited this may impact the availability of applications utilizing this functionality across affected Red Hat products.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12084"
},
{
"category": "external",
"summary": "RHBZ#2418655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418655"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12084",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12084"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/142145",
"url": "https://github.com/python/cpython/issues/142145"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/142146",
"url": "https://github.com/python/cpython/pull/142146"
}
],
"release_date": "2025-12-03T18:55:32.222000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service"
},
{
"cve": "CVE-2025-12818",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-13T14:01:22.870197+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414826"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in PostgreSQL\u2019s libpq client library, where integer wraparound in several allocation-size calculations allows a peer or input provider to cause an undersized buffer and then write out-of-bounds by hundreds of megabytes. This can lead to a client application segmentation fault or crash when using libpq to connect to a PostgreSQL server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "postgresql: libpq: libpq undersizes allocations, via integer wraparound",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated Moderate severity by Red Hat Product Security, even though it carries a High CVSS v3.1 score. The flaw resides in the libpq client library and can be triggered when a client receives specially crafted PostgreSQL protocol data that causes an integer wraparound and an out-of-bounds write. The attack complexity is Low because the malformed protocol message is processed immediately during connection, with no timing or environmental conditions required. However, the impact is limited to a denial of service of the client application only. As a result, Red Hat classifies the overall product impact as Moderate, reflecting that the flaw can interrupt client availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12818"
},
{
"category": "external",
"summary": "RHBZ#2414826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414826"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12818"
},
{
"category": "external",
"summary": "https://www.postgresql.org/support/security/CVE-2025-12818/",
"url": "https://www.postgresql.org/support/security/CVE-2025-12818/"
}
],
"release_date": "2025-11-13T13:00:12.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "postgresql: libpq: libpq undersizes allocations, via integer wraparound"
},
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
},
{
"cve": "CVE-2025-13836",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-01T19:01:03.091899+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418078"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the http.client module in the Python standard library. When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This issue allows a malicious server to cause the client to read large amounts of data into memory, potentially causing memory allocations errors, swapping, out-of-memory conditions or even system freezes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: Excessive read buffering DoS in http.client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue can only be exploited by Python applications using the http.client.HTTPResponse.read function without the amount parameter, which specifies the read size in bytes. Note that Python libraries may use this function internally and make applications vulnerable. Additionally, vulnerable Python applications must connect to a malicious or compromised server that replies with a very large or crafted Content-Length header to trigger this issue, limiting the exposure of this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13836"
},
{
"category": "external",
"summary": "RHBZ#2418078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418078"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13836"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/119451",
"url": "https://github.com/python/cpython/issues/119451"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/119454",
"url": "https://github.com/python/cpython/pull/119454"
}
],
"release_date": "2025-12-01T18:02:38.483000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Since this vulnerability is triggered when no read amount is specified and the client defaults to using the potentially malicious Content-Length header, developers can mitigate this issue in their code by always imposing an explicit, safe limit on data reads.\n\nApplications using the http.client.HTTPResponse.read function directly can ensure that read operations specify a byte limit:\n\n~~~\n...\nmax_safe_read = 10 * 1024 * 1024\ndata = response.read(max_safe_read)\n...\n~~~",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: Excessive read buffering DoS in http.client"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-15468",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2026-01-16T14:21:51.062000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430377"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. A remote attacker could trigger a NULL pointer dereference by sending an unknown or unsupported cipher ID during the client hello callback in applications using the QUIC (Quick UDP Internet Connections) protocol. This vulnerability, occurring when the SSL_CIPHER_find() function is called in this specific context, leads to an abnormal termination of the running process, causing a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The NULL pointer dereference in the `SSL_CIPHER_find()` function, affecting OpenSSL versions 3.3, 3.4, 3.5, and 3.6, occurs only when applications utilizing the QUIC protocol uncommonly invoke this function from the `client_hello_cb` callback with an unknown cipher ID. This specific usage pattern and the resulting Denial of Service limit the overall impact in the Red Hat context.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15468"
},
{
"category": "external",
"summary": "RHBZ#2430377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430377"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15468"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling"
},
{
"cve": "CVE-2025-15469",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"discovery_date": "2026-01-16T14:21:51.411000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430378"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in openssl. When a user signs or verifies files larger than 16MB using the `openssl dgst` command with one-shot algorithms, the tool silently truncates the input to 16MB. This creates an integrity gap, allowing trailing data beyond the initial 16MB to be modified without detection because it remains unauthenticated. This vulnerability primarily impacts workflows that both sign and verify files using the affected `openssl dgst` command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The flaw affects the `openssl dgst` command-line tool when used with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) on files larger than 16MB. Impact is limited as it requires both signing and verification to be performed using the affected command, and verifiers using library APIs are not impacted.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15469"
},
{
"category": "external",
"summary": "RHBZ#2430378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430378"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15469",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15469"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using the `openssl dgst` command with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) for files larger than 16MB. Instead, utilize streaming digest algorithms with `openssl dgst` or use library APIs for signing and verification, as these are not affected by the truncation vulnerability. Users should ensure that input files for one-shot signing/verification with `openssl dgst` do not exceed 16MB.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation"
},
{
"cve": "CVE-2025-66199",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-16T14:21:51.739000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit this vulnerability by sending a specially crafted CompressedCertificate message during the TLS 1.3 handshake. This can cause excessive per-connection memory allocations, leading to resource exhaustion and a Denial of Service (DoS) for affected clients and servers. This issue occurs when TLS 1.3 certificate compression is enabled and negotiated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. The flaw in OpenSSL 3.3, 3.4, 3.5, and 3.6 allows an attacker to cause excessive memory allocation during TLS 1.3 handshake with certificate compression, potentially leading to a Denial of Service. This affects both clients and servers in mutual TLS scenarios where certificate compression is negotiated. Servers not requesting client certificates are not vulnerable to client-initiated attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66199"
},
{
"category": "external",
"summary": "RHBZ#2430379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66199",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66199"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "To mitigate this issue, disable the reception of compressed certificates by setting the SSL_OP_NO_RX_CERTIFICATE_COMPRESSION option in OpenSSL configurations. This will prevent the vulnerable code path from being exercised.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-68160",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2026-01-16T14:21:52.088000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430380"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This vulnerability involves an out-of-bounds write in the line-buffering BIO filter, which can lead to memory corruption. While exploitation is unlikely to be under direct attacker control, a successful attack could cause an application to crash, resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat. The `BIO_f_linebuffer` filter, where this heap out-of-bounds write occurs, is not used by default in TLS/SSL data paths within Red Hat products. Exploitation requires third-party applications to explicitly use this filter with a BIO chain that can short-write and process large, newline-free data influenced by an attacker, which is an unlikely scenario under attacker control. Red Hat FIPS modules are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68160"
},
{
"category": "external",
"summary": "RHBZ#2430380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430380"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68160"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter"
},
{
"cve": "CVE-2025-68973",
"cwe": {
"id": "CWE-675",
"name": "Multiple Operations on Resource in Single-Operation Context"
},
"discovery_date": "2025-12-28T17:00:44.161022+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425966"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GnuPG. An attacker can provide crafted input to the `armor_filter` function, which incorrectly increments an index variable, leading to an out-of-bounds write. This memory corruption vulnerability may allow for information disclosure and could potentially lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in GnuPG\u0027s `armor_filter` function allows an attacker with local access to provide crafted input, potentially leading to information disclosure and arbitrary code execution due to an out-of-bounds write. Exploitation requires high attack complexity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68973"
},
{
"category": "external",
"summary": "RHBZ#2425966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68973"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306",
"url": "https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306"
},
{
"category": "external",
"summary": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9",
"url": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9"
},
{
"category": "external",
"summary": "https://gpg.fail/memcpy",
"url": "https://gpg.fail/memcpy"
},
{
"category": "external",
"summary": "https://news.ycombinator.com/item?id=46403200",
"url": "https://news.ycombinator.com/item?id=46403200"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/12/28/5",
"url": "https://www.openwall.com/lists/oss-security/2025/12/28/5"
}
],
"release_date": "2025-12-28T16:19:11.019000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid processing untrusted or unverified input with GnuPG. Exercise caution when handling GnuPG-encrypted or signed data from unknown or suspicious sources, as specially crafted input could trigger the vulnerability. This operational control reduces the attack surface by limiting exposure to malicious data.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write"
},
{
"cve": "CVE-2025-69418",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2026-01-16T14:21:52.438000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430381"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When applications directly call the low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in a single call on hardware-accelerated builds, the trailing 1-15 bytes of a message may be exposed in cleartext. These exposed bytes are not covered by the authentication tag, allowing an attacker to read or tamper with them without detection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. In the Red Hat context, impact is limited because typical OpenSSL consumers using higher-level EVP APIs are not affected. The flaw only manifests when applications directly call low-level CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions with non-block-aligned lengths in hardware-accelerated builds. Additionally, TLS does not use OCB ciphersuites, and FIPS modules are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69418"
},
{
"category": "external",
"summary": "RHBZ#2430381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69418"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls"
},
{
"cve": "CVE-2025-69419",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-01-16T14:21:52.793000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430386"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. When processing a specially crafted PKCS#12 (Personal Information Exchange Syntax Standard) file, a remote attacker can exploit an out-of-bounds write vulnerability. This issue, occurring within the OPENSSL_uni2utf8() function, leads to memory corruption by writing data beyond its allocated buffer. Successful exploitation could result in a denial of service or potentially allow for arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. An out-of-bounds write in OpenSSL\u0027s PKCS12_get_friendlyname() function can lead to denial of service or arbitrary code execution. Exploitation requires an application to parse a specially crafted malicious PKCS#12 file. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69419"
},
{
"category": "external",
"summary": "RHBZ#2430386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, Red Hat recommends avoiding the processing of PKCS#12 files from untrusted or unverified sources. Applications that use the `PKCS12_get_friendlyname()` API should ensure that PKCS#12 files are only processed if they originate from trusted entities. Restricting the input sources for PKCS#12 files can significantly reduce the attack surface for this flaw.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing"
},
{
"cve": "CVE-2025-69420",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-01-16T14:21:53.497000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430388"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A type confusion vulnerability exists in the TimeStamp Response verification code, where an ASN1_TYPE union member is accessed without proper type validation. A remote attacker can exploit this by providing a malformed TimeStamp Response to an application that verifies timestamp responses. This can lead to an invalid or NULL pointer dereference, resulting in a Denial of Service (DoS) due to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. A type confusion flaw in the TimeStamp Response verification code can lead to a Denial of Service when processing a specially crafted TimeStamp Response. Exploitation requires an application to call `TS_RESP_verify_response()` with a malformed response, and the TimeStamp protocol (RFC 3161) is not widely used. Red Hat FIPS modules are not affected as the TimeStamp Response implementation is outside the FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69420"
},
{
"category": "external",
"summary": "RHBZ#2430388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69420"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response"
},
{
"cve": "CVE-2025-69421",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2026-01-16T14:21:53.845000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430387"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This vulnerability allows a remote attacker to trigger a Denial of Service (DoS) by providing a specially crafted, malformed PKCS#12 file to an application that processes it. The flaw occurs due to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when handling the malformed file, leading to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat because it requires an application to process a specially crafted, malformed PKCS#12 file, leading to a Denial of Service. The vulnerability is limited to a crash and cannot be escalated to achieve code execution or memory disclosure. Red Hat FIPS modules are not affected as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69421"
},
{
"category": "external",
"summary": "RHBZ#2430387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69421",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69421"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-22795",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2026-01-16T14:21:53.146000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430389"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a Denial of Service (DoS) by tricking a user or application into processing a maliciously crafted PKCS#12 (Personal Information Exchange Syntax Standard) file. The vulnerability leads to an invalid or NULL pointer dereference, resulting in an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. An application processing a maliciously crafted PKCS#12 file can be caused to dereference an invalid or NULL pointer, resulting in a Denial of Service. In the Red Hat context, impact is limited as PKCS#12 files are typically used for trusted private keys and are not commonly accepted from untrusted sources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22795"
},
{
"category": "external",
"summary": "RHBZ#2430389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22795"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing"
},
{
"cve": "CVE-2026-22796",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-01-16T14:43:21.598000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430390"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. This type confusion vulnerability allows a remote attacker to cause a denial of service (DoS) by providing specially crafted PKCS#7 data to an application that performs signature verification. The vulnerability occurs because the application accesses an ASN1_TYPE union member without proper type validation, leading to an invalid or NULL pointer dereference and a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Low for Red Hat products. A type confusion flaw in the legacy PKCS#7 API can lead to a Denial of Service when processing specially crafted PKCS#7 data. Exploitation requires an application to perform signature verification of malformed PKCS#7 data. Red Hat products utilizing the FIPS module are not affected as the PKCS#7 parsing is outside the module boundary.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22796"
},
{
"category": "external",
"summary": "RHBZ#2430390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22796"
}
],
"release_date": "2026-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T17:31:06+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:519d4fe184cebe5152f840e9f609fa4705590656ac9bcace2e2e17622ab7e6a8_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:d4d6cd6b1a84587ee851c4f76b47c1e6bf9f597f4a476c34e4a257cd1a860448_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:26bb49a8e2e695d61192f04eb0db63efa8210bba20ea22b60e4e22d519d8b9e6_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4ba29e3e7565cfdfdedcc558bc8495398cee07742fda133b0bc04fd657b908cd_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification"
}
]
}
RHSA-2026:1627
Vulnerability from csaf_redhat - Published: 2026-02-02 01:40 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1627",
"url": "https://access.redhat.com/errata/RHSA-2026:1627"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1627.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:14+00:00",
"generator": {
"date": "2026-02-19T13:37:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1627",
"initial_release_date": "2026-02-02T01:40:16+00:00",
"revision_history": [
{
"date": "2026-02-02T01:40:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-02T01:40:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-8.el8_2.4.src",
"product": {
"name": "glib2-0:2.56.4-8.el8_2.4.src",
"product_id": "glib2-0:2.56.4-8.el8_2.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-8.el8_2.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-8.el8_2.4.i686",
"product": {
"name": "glib2-0:2.56.4-8.el8_2.4.i686",
"product_id": "glib2-0:2.56.4-8.el8_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-8.el8_2.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-8.el8_2.4.i686",
"product": {
"name": "glib2-devel-0:2.56.4-8.el8_2.4.i686",
"product_id": "glib2-devel-0:2.56.4-8.el8_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-8.el8_2.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-8.el8_2.4.i686",
"product": {
"name": "glib2-debugsource-0:2.56.4-8.el8_2.4.i686",
"product_id": "glib2-debugsource-0:2.56.4-8.el8_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-8.el8_2.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product": {
"name": "glib2-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product_id": "glib2-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-8.el8_2.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product_id": "glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-8.el8_2.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product_id": "glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-8.el8_2.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product_id": "glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-8.el8_2.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-8.el8_2.4.x86_64",
"product": {
"name": "glib2-0:2.56.4-8.el8_2.4.x86_64",
"product_id": "glib2-0:2.56.4-8.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-8.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-8.el8_2.4.x86_64",
"product": {
"name": "glib2-devel-0:2.56.4-8.el8_2.4.x86_64",
"product_id": "glib2-devel-0:2.56.4-8.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-8.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-8.el8_2.4.x86_64",
"product": {
"name": "glib2-fam-0:2.56.4-8.el8_2.4.x86_64",
"product_id": "glib2-fam-0:2.56.4-8.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-8.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-8.el8_2.4.x86_64",
"product": {
"name": "glib2-tests-0:2.56.4-8.el8_2.4.x86_64",
"product_id": "glib2-tests-0:2.56.4-8.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-8.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-8.el8_2.4.x86_64",
"product": {
"name": "glib2-debugsource-0:2.56.4-8.el8_2.4.x86_64",
"product_id": "glib2-debugsource-0:2.56.4-8.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-8.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product_id": "glib2-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-8.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-8.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-8.el8_2.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-8.el8_2.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-8.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.i686"
},
"product_reference": "glib2-0:2.56.4-8.el8_2.4.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-8.el8_2.4.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.src"
},
"product_reference": "glib2-0:2.56.4-8.el8_2.4.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-8.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.x86_64"
},
"product_reference": "glib2-0:2.56.4-8.el8_2.4.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-8.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-debuginfo-0:2.56.4-8.el8_2.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-8.el8_2.4.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-8.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-debuginfo-0:2.56.4-8.el8_2.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-8.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-debugsource-0:2.56.4-8.el8_2.4.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-8.el8_2.4.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-8.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-debugsource-0:2.56.4-8.el8_2.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-8.el8_2.4.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-8.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-devel-0:2.56.4-8.el8_2.4.i686"
},
"product_reference": "glib2-devel-0:2.56.4-8.el8_2.4.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-8.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-devel-0:2.56.4-8.el8_2.4.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-8.el8_2.4.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-8.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-fam-0:2.56.4-8.el8_2.4.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-8.el8_2.4.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-8.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-tests-0:2.56.4-8.el8_2.4.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-8.el8_2.4.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.src",
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-debugsource-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-debugsource-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-devel-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-devel-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-fam-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-tests-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T01:40:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.src",
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-debugsource-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-debugsource-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-devel-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-devel-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-fam-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-tests-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1627"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.src",
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-debugsource-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-debugsource-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-devel-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-devel-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-fam-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-tests-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.src",
"BaseOS-8.2.0.Z.AUS:glib2-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-debugsource-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-debugsource-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-devel-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-devel-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-fam-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-tests-0:2.56.4-8.el8_2.4.x86_64",
"BaseOS-8.2.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.i686",
"BaseOS-8.2.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-8.el8_2.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:1323
Vulnerability from csaf_redhat - Published: 2026-01-27 07:08 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1323",
"url": "https://access.redhat.com/errata/RHSA-2026:1323"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "RHEL-142620",
"url": "https://issues.redhat.com/browse/RHEL-142620"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1323.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:09+00:00",
"generator": {
"date": "2026-02-19T13:37:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1323",
"initial_release_date": "2026-01-27T07:08:41+00:00",
"revision_history": [
{
"date": "2026-01-27T07:08:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-27T07:08:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-5.el9_0.4.src",
"product": {
"name": "glib2-0:2.68.4-5.el9_0.4.src",
"product_id": "glib2-0:2.68.4-5.el9_0.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-5.el9_0.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-5.el9_0.4.aarch64",
"product": {
"name": "glib2-0:2.68.4-5.el9_0.4.aarch64",
"product_id": "glib2-0:2.68.4-5.el9_0.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-5.el9_0.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"product": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"product_id": "glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-5.el9_0.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"product_id": "glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-5.el9_0.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-5.el9_0.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-5.el9_0.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"product": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"product_id": "glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-5.el9_0.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"product": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"product_id": "glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-5.el9_0.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-5.el9_0.4.ppc64le",
"product": {
"name": "glib2-0:2.68.4-5.el9_0.4.ppc64le",
"product_id": "glib2-0:2.68.4-5.el9_0.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-5.el9_0.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"product_id": "glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-5.el9_0.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"product_id": "glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-5.el9_0.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-5.el9_0.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-5.el9_0.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"product": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"product_id": "glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-5.el9_0.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"product": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"product_id": "glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-5.el9_0.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-5.el9_0.4.i686",
"product": {
"name": "glib2-0:2.68.4-5.el9_0.4.i686",
"product_id": "glib2-0:2.68.4-5.el9_0.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-5.el9_0.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"product": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"product_id": "glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-5.el9_0.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"product": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"product_id": "glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-5.el9_0.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"product_id": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-5.el9_0.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"product_id": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-5.el9_0.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-5.el9_0.4.i686",
"product": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.i686",
"product_id": "glib2-devel-0:2.68.4-5.el9_0.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-5.el9_0.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-5.el9_0.4.x86_64",
"product": {
"name": "glib2-0:2.68.4-5.el9_0.4.x86_64",
"product_id": "glib2-0:2.68.4-5.el9_0.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-5.el9_0.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"product": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"product_id": "glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-5.el9_0.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"product_id": "glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-5.el9_0.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-5.el9_0.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-5.el9_0.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"product": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"product_id": "glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-5.el9_0.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"product": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"product_id": "glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-5.el9_0.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-5.el9_0.4.s390x",
"product": {
"name": "glib2-0:2.68.4-5.el9_0.4.s390x",
"product_id": "glib2-0:2.68.4-5.el9_0.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-5.el9_0.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"product": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"product_id": "glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-5.el9_0.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"product": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"product_id": "glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-5.el9_0.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"product_id": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-5.el9_0.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"product_id": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-5.el9_0.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"product": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"product_id": "glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-5.el9_0.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"product": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"product_id": "glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-5.el9_0.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"product": {
"name": "glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"product_id": "glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.68.4-5.el9_0.4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.src"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-devel-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-5.el9_0.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-doc-0:2.68.4-5.el9_0.4.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.src"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-devel-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-5.el9_0.4.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-doc-0:2.68.4-5.el9_0.4.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.src",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.src",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-27T07:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.src",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.src",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1323"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.src",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.src",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.src",
"AppStream-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"AppStream-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.src",
"BaseOS-9.0.0.Z.E4S:glib2-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-debugsource-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-devel-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-devel-debuginfo-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-doc-0:2.68.4-5.el9_0.4.noarch",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-tests-0:2.68.4-5.el9_0.4.x86_64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.aarch64",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.i686",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.ppc64le",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.s390x",
"BaseOS-9.0.0.Z.E4S:glib2-tests-debuginfo-0:2.68.4-5.el9_0.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:1465
Vulnerability from csaf_redhat - Published: 2026-01-28 06:53 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1465",
"url": "https://access.redhat.com/errata/RHSA-2026:1465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1465.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:05+00:00",
"generator": {
"date": "2026-02-19T13:37:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1465",
"initial_release_date": "2026-01-28T06:53:11+00:00",
"revision_history": [
{
"date": "2026-01-28T06:53:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-28T06:53:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"product": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"product_id": "glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-16.el9_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"product": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"product_id": "glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-16.el9_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"product": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"product_id": "glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-16.el9_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"product_id": "glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-16.el9_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-16.el9_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-16.el9_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-16.el9_6.4.aarch64",
"product": {
"name": "glib2-0:2.68.4-16.el9_6.4.aarch64",
"product_id": "glib2-0:2.68.4-16.el9_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-16.el9_6.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"product": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"product_id": "glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-16.el9_6.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"product": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"product_id": "glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-16.el9_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"product": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"product_id": "glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-16.el9_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"product_id": "glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-16.el9_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"product_id": "glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-16.el9_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-16.el9_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-16.el9_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-16.el9_6.4.ppc64le",
"product": {
"name": "glib2-0:2.68.4-16.el9_6.4.ppc64le",
"product_id": "glib2-0:2.68.4-16.el9_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-16.el9_6.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"product": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"product_id": "glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-16.el9_6.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-16.el9_6.4.i686",
"product": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.i686",
"product_id": "glib2-devel-0:2.68.4-16.el9_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-16.el9_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"product": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"product_id": "glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-16.el9_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"product": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"product_id": "glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-16.el9_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"product_id": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-16.el9_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"product_id": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-16.el9_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-16.el9_6.4.i686",
"product": {
"name": "glib2-0:2.68.4-16.el9_6.4.i686",
"product_id": "glib2-0:2.68.4-16.el9_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-16.el9_6.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-16.el9_6.4.i686",
"product": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.i686",
"product_id": "glib2-static-0:2.68.4-16.el9_6.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-16.el9_6.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"product": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"product_id": "glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-16.el9_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"product": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"product_id": "glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-16.el9_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"product": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"product_id": "glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-16.el9_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"product_id": "glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-16.el9_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-16.el9_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-16.el9_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-16.el9_6.4.x86_64",
"product": {
"name": "glib2-0:2.68.4-16.el9_6.4.x86_64",
"product_id": "glib2-0:2.68.4-16.el9_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-16.el9_6.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"product": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"product_id": "glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-16.el9_6.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"product": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"product_id": "glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.68.4-16.el9_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"product": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"product_id": "glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.68.4-16.el9_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"product": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"product_id": "glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.68.4-16.el9_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"product": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"product_id": "glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.68.4-16.el9_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"product_id": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.68.4-16.el9_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"product_id": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.68.4-16.el9_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-0:2.68.4-16.el9_6.4.s390x",
"product": {
"name": "glib2-0:2.68.4-16.el9_6.4.s390x",
"product_id": "glib2-0:2.68.4-16.el9_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-16.el9_6.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.68.4-16.el9_6.4.s390x",
"product": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.s390x",
"product_id": "glib2-static-0:2.68.4-16.el9_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.68.4-16.el9_6.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"product": {
"name": "glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"product_id": "glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.68.4-16.el9_6.4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.68.4-16.el9_6.4.src",
"product": {
"name": "glib2-0:2.68.4-16.el9_6.4.src",
"product_id": "glib2-0:2.68.4-16.el9_6.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.68.4-16.el9_6.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-16.el9_6.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.src",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-16.el9_6.4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.src",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.68.4-16.el9_6.4.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch"
},
"product_reference": "glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-28T06:53:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1465"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"AppStream-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"AppStream-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"BaseOS-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"BaseOS-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.src",
"CRB-9.6.0.Z.EUS:glib2-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-debugsource-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-devel-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-devel-debuginfo-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-doc-0:2.68.4-16.el9_6.4.noarch",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-static-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-tests-0:2.68.4-16.el9_6.4.x86_64",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.aarch64",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.i686",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.ppc64le",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.s390x",
"CRB-9.6.0.Z.EUS:glib2-tests-debuginfo-0:2.68.4-16.el9_6.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:0991
Vulnerability from csaf_redhat - Published: 2026-01-22 12:22 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0991",
"url": "https://access.redhat.com/errata/RHSA-2026:0991"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "RHEL-138585",
"url": "https://issues.redhat.com/browse/RHEL-138585"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0991.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:11+00:00",
"generator": {
"date": "2026-02-19T13:37:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:0991",
"initial_release_date": "2026-01-22T12:22:52+00:00",
"revision_history": [
{
"date": "2026-01-22T12:22:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-22T12:22:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-168.el8_10.x86_64",
"product": {
"name": "glib2-0:2.56.4-168.el8_10.x86_64",
"product_id": "glib2-0:2.56.4-168.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-168.el8_10.x86_64",
"product": {
"name": "glib2-devel-0:2.56.4-168.el8_10.x86_64",
"product_id": "glib2-devel-0:2.56.4-168.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-168.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-168.el8_10.x86_64",
"product": {
"name": "glib2-fam-0:2.56.4-168.el8_10.x86_64",
"product_id": "glib2-fam-0:2.56.4-168.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-168.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-168.el8_10.x86_64",
"product": {
"name": "glib2-tests-0:2.56.4-168.el8_10.x86_64",
"product_id": "glib2-tests-0:2.56.4-168.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-168.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"product": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"product_id": "glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-168.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product_id": "glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-168.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-168.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-168.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-168.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-168.el8_10.x86_64",
"product": {
"name": "glib2-static-0:2.56.4-168.el8_10.x86_64",
"product_id": "glib2-static-0:2.56.4-168.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-168.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-168.el8_10.i686",
"product": {
"name": "glib2-0:2.56.4-168.el8_10.i686",
"product_id": "glib2-0:2.56.4-168.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-168.el8_10.i686",
"product": {
"name": "glib2-devel-0:2.56.4-168.el8_10.i686",
"product_id": "glib2-devel-0:2.56.4-168.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-168.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-168.el8_10.i686",
"product": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.i686",
"product_id": "glib2-debugsource-0:2.56.4-168.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-168.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"product": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"product_id": "glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-168.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"product_id": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-168.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"product_id": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-168.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"product_id": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-168.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-168.el8_10.i686",
"product": {
"name": "glib2-static-0:2.56.4-168.el8_10.i686",
"product_id": "glib2-static-0:2.56.4-168.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-168.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-168.el8_10.s390x",
"product": {
"name": "glib2-0:2.56.4-168.el8_10.s390x",
"product_id": "glib2-0:2.56.4-168.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-168.el8_10.s390x",
"product": {
"name": "glib2-devel-0:2.56.4-168.el8_10.s390x",
"product_id": "glib2-devel-0:2.56.4-168.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-168.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-168.el8_10.s390x",
"product": {
"name": "glib2-fam-0:2.56.4-168.el8_10.s390x",
"product_id": "glib2-fam-0:2.56.4-168.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-168.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-168.el8_10.s390x",
"product": {
"name": "glib2-tests-0:2.56.4-168.el8_10.s390x",
"product_id": "glib2-tests-0:2.56.4-168.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-168.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"product": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"product_id": "glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-168.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"product": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"product_id": "glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-168.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"product_id": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-168.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"product_id": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-168.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"product_id": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-168.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-168.el8_10.s390x",
"product": {
"name": "glib2-static-0:2.56.4-168.el8_10.s390x",
"product_id": "glib2-static-0:2.56.4-168.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-168.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-168.el8_10.src",
"product": {
"name": "glib2-0:2.56.4-168.el8_10.src",
"product_id": "glib2-0:2.56.4-168.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-168.el8_10.aarch64",
"product": {
"name": "glib2-0:2.56.4-168.el8_10.aarch64",
"product_id": "glib2-0:2.56.4-168.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-168.el8_10.aarch64",
"product": {
"name": "glib2-devel-0:2.56.4-168.el8_10.aarch64",
"product_id": "glib2-devel-0:2.56.4-168.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-168.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-168.el8_10.aarch64",
"product": {
"name": "glib2-fam-0:2.56.4-168.el8_10.aarch64",
"product_id": "glib2-fam-0:2.56.4-168.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-168.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-168.el8_10.aarch64",
"product": {
"name": "glib2-tests-0:2.56.4-168.el8_10.aarch64",
"product_id": "glib2-tests-0:2.56.4-168.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-168.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"product": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"product_id": "glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-168.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product_id": "glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-168.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-168.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-168.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-168.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-168.el8_10.aarch64",
"product": {
"name": "glib2-static-0:2.56.4-168.el8_10.aarch64",
"product_id": "glib2-static-0:2.56.4-168.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-168.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-168.el8_10.ppc64le",
"product": {
"name": "glib2-0:2.56.4-168.el8_10.ppc64le",
"product_id": "glib2-0:2.56.4-168.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"product": {
"name": "glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"product_id": "glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-168.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"product": {
"name": "glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"product_id": "glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-168.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"product": {
"name": "glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"product_id": "glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-168.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"product_id": "glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-168.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product_id": "glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-168.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-168.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product_id": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-168.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-168.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-168.el8_10.ppc64le",
"product": {
"name": "glib2-static-0:2.56.4-168.el8_10.ppc64le",
"product_id": "glib2-static-0:2.56.4-168.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-168.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-doc-0:2.56.4-168.el8_10.noarch",
"product": {
"name": "glib2-doc-0:2.56.4-168.el8_10.noarch",
"product_id": "glib2-doc-0:2.56.4-168.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.56.4-168.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.src"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-devel-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-devel-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-devel-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.56.4-168.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-doc-0:2.56.4-168.el8_10.noarch"
},
"product_reference": "glib2-doc-0:2.56.4-168.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-fam-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-fam-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-static-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-static-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-static-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-static-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-static-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-tests-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-tests-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.src"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-devel-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-devel-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-devel-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.56.4-168.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-doc-0:2.56.4-168.el8_10.noarch"
},
"product_reference": "glib2-doc-0:2.56.4-168.el8_10.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-fam-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-fam-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-static-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-static-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-static-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-static-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-static-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-tests-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-tests-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-doc-0:2.56.4-168.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-doc-0:2.56.4-168.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-22T12:22:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-doc-0:2.56.4-168.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-doc-0:2.56.4-168.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0991"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-doc-0:2.56.4-168.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-doc-0:2.56.4-168.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-doc-0:2.56.4-168.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:glib2-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-debugsource-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-devel-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-doc-0:2.56.4-168.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-fam-debuginfo-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-static-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-0:2.56.4-168.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:glib2-tests-debuginfo-0:2.56.4-168.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
RHSA-2026:1626
Vulnerability from csaf_redhat - Published: 2026-02-02 01:36 - Updated: 2026-02-19 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1626",
"url": "https://access.redhat.com/errata/RHSA-2026:1626"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1626.json"
}
],
"title": "Red Hat Security Advisory: glib2 security update",
"tracking": {
"current_release_date": "2026-02-19T13:37:15+00:00",
"generator": {
"date": "2026-02-19T13:37:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1626",
"initial_release_date": "2026-02-02T01:36:56+00:00",
"revision_history": [
{
"date": "2026-02-02T01:36:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-02T01:36:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T13:37:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus_long_life:8.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-10.el8_4.4.src",
"product": {
"name": "glib2-0:2.56.4-10.el8_4.4.src",
"product_id": "glib2-0:2.56.4-10.el8_4.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-10.el8_4.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-10.el8_4.4.i686",
"product": {
"name": "glib2-0:2.56.4-10.el8_4.4.i686",
"product_id": "glib2-0:2.56.4-10.el8_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-10.el8_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-10.el8_4.4.i686",
"product": {
"name": "glib2-devel-0:2.56.4-10.el8_4.4.i686",
"product_id": "glib2-devel-0:2.56.4-10.el8_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-10.el8_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"product": {
"name": "glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"product_id": "glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-10.el8_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product": {
"name": "glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product_id": "glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-10.el8_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product_id": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-10.el8_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product_id": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-10.el8_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product_id": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-10.el8_4.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-10.el8_4.4.x86_64",
"product": {
"name": "glib2-0:2.56.4-10.el8_4.4.x86_64",
"product_id": "glib2-0:2.56.4-10.el8_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-10.el8_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"product": {
"name": "glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"product_id": "glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-10.el8_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"product": {
"name": "glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"product_id": "glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-10.el8_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"product": {
"name": "glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"product_id": "glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-10.el8_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"product": {
"name": "glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"product_id": "glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-10.el8_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product_id": "glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-10.el8_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-10.el8_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-10.el8_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-10.el8_4.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-10.el8_4.4.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.src"
},
"product_reference": "glib2-0:2.56.4-10.el8_4.4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-debuginfo-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-debugsource-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-devel-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-devel-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-devel-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-fam-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-tests-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-10.el8_4.4.src as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.src"
},
"product_reference": "glib2-0:2.56.4-10.el8_4.4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debuginfo-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debugsource-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-devel-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-24T12:49:28.274000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416741"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Integer overflow in in g_escape_uri_string()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.src",
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-devel-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "RHBZ#2416741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"release_date": "2025-11-24T13:00:15.295000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-02T01:36:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.src",
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-devel-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.src",
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-devel-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.src",
"BaseOS-8.4.0.Z.AUS:glib2-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-devel-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.AUS:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debugsource-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-debugsource-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-devel-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-fam-debuginfo-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-0:2.56.4-10.el8_4.4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:glib2-tests-debuginfo-0:2.56.4-10.el8_4.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Integer overflow in in g_escape_uri_string()"
}
]
}
SUSE-SU-2025:4441-1
Vulnerability from csaf_suse - Published: 2025-12-17 16:15 - Updated: 2025-12-17 16:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glib2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glib2 fixes the following issues:\n\n- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote\n filesystem attribute values can lead to denial-of-service (bsc#1254878).\n- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when\n processing attacker-influenced data may lead to crash or code execution (bsc#1254662).\n- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a\n large number of unacceptable characters may lead to crash or code execution (bsc#1254297).\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4441,SUSE-SLE-SERVER-12-SP5-LTSS-2025-4441,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4441",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4441-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4441-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254441-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4441-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023585.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254297",
"url": "https://bugzilla.suse.com/1254297"
},
{
"category": "self",
"summary": "SUSE Bug 1254662",
"url": "https://bugzilla.suse.com/1254662"
},
{
"category": "self",
"summary": "SUSE Bug 1254878",
"url": "https://bugzilla.suse.com/1254878"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13601 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14512 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14512/"
}
],
"title": "Security update for glib2",
"tracking": {
"current_release_date": "2025-12-17T16:15:21Z",
"generator": {
"date": "2025-12-17T16:15:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4441-1",
"initial_release_date": "2025-12-17T16:15:21Z",
"revision_history": [
{
"date": "2025-12-17T16:15:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.48.2-12.52.1.aarch64",
"product": {
"name": "glib2-devel-2.48.2-12.52.1.aarch64",
"product_id": "glib2-devel-2.48.2-12.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.48.2-12.52.1.aarch64",
"product": {
"name": "glib2-devel-static-2.48.2-12.52.1.aarch64",
"product_id": "glib2-devel-static-2.48.2-12.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.48.2-12.52.1.aarch64",
"product": {
"name": "glib2-tools-2.48.2-12.52.1.aarch64",
"product_id": "glib2-tools-2.48.2-12.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.48.2-12.52.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.48.2-12.52.1.aarch64",
"product_id": "libgio-2_0-0-2.48.2-12.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-fam-2.48.2-12.52.1.aarch64",
"product": {
"name": "libgio-fam-2.48.2-12.52.1.aarch64",
"product_id": "libgio-fam-2.48.2-12.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.48.2-12.52.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.48.2-12.52.1.aarch64",
"product_id": "libglib-2_0-0-2.48.2-12.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"product_id": "libgmodule-2_0-0-2.48.2-12.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"product_id": "libgobject-2_0-0-2.48.2-12.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"product": {
"name": "libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"product_id": "libgthread-2_0-0-2.48.2-12.52.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product": {
"name": "glib2-devel-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product_id": "glib2-devel-64bit-2.48.2-12.52.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "glib2-tools-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product": {
"name": "glib2-tools-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product_id": "glib2-tools-64bit-2.48.2-12.52.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product": {
"name": "libgio-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product_id": "libgio-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgio-fam-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product": {
"name": "libgio-fam-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product_id": "libgio-fam-64bit-2.48.2-12.52.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product": {
"name": "libglib-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product_id": "libglib-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product": {
"name": "libgmodule-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product_id": "libgmodule-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product": {
"name": "libgobject-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product_id": "libgobject-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product": {
"name": "libgthread-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32",
"product_id": "libgthread-2_0-0-64bit-2.48.2-12.52.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.48.2-12.52.1.i586",
"product": {
"name": "glib2-devel-2.48.2-12.52.1.i586",
"product_id": "glib2-devel-2.48.2-12.52.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.48.2-12.52.1.i586",
"product": {
"name": "glib2-devel-static-2.48.2-12.52.1.i586",
"product_id": "glib2-devel-static-2.48.2-12.52.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.48.2-12.52.1.i586",
"product": {
"name": "glib2-tools-2.48.2-12.52.1.i586",
"product_id": "glib2-tools-2.48.2-12.52.1.i586"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.48.2-12.52.1.i586",
"product": {
"name": "libgio-2_0-0-2.48.2-12.52.1.i586",
"product_id": "libgio-2_0-0-2.48.2-12.52.1.i586"
}
},
{
"category": "product_version",
"name": "libgio-fam-2.48.2-12.52.1.i586",
"product": {
"name": "libgio-fam-2.48.2-12.52.1.i586",
"product_id": "libgio-fam-2.48.2-12.52.1.i586"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.48.2-12.52.1.i586",
"product": {
"name": "libglib-2_0-0-2.48.2-12.52.1.i586",
"product_id": "libglib-2_0-0-2.48.2-12.52.1.i586"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.48.2-12.52.1.i586",
"product": {
"name": "libgmodule-2_0-0-2.48.2-12.52.1.i586",
"product_id": "libgmodule-2_0-0-2.48.2-12.52.1.i586"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.48.2-12.52.1.i586",
"product": {
"name": "libgobject-2_0-0-2.48.2-12.52.1.i586",
"product_id": "libgobject-2_0-0-2.48.2-12.52.1.i586"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.48.2-12.52.1.i586",
"product": {
"name": "libgthread-2_0-0-2.48.2-12.52.1.i586",
"product_id": "libgthread-2_0-0-2.48.2-12.52.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.48.2-12.52.1.noarch",
"product": {
"name": "gio-branding-upstream-2.48.2-12.52.1.noarch",
"product_id": "gio-branding-upstream-2.48.2-12.52.1.noarch"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.48.2-12.52.1.noarch",
"product": {
"name": "glib2-lang-2.48.2-12.52.1.noarch",
"product_id": "glib2-lang-2.48.2-12.52.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.48.2-12.52.1.ppc64le",
"product": {
"name": "glib2-devel-2.48.2-12.52.1.ppc64le",
"product_id": "glib2-devel-2.48.2-12.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.48.2-12.52.1.ppc64le",
"product": {
"name": "glib2-devel-static-2.48.2-12.52.1.ppc64le",
"product_id": "glib2-devel-static-2.48.2-12.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.48.2-12.52.1.ppc64le",
"product": {
"name": "glib2-tools-2.48.2-12.52.1.ppc64le",
"product_id": "glib2-tools-2.48.2-12.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"product": {
"name": "libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"product_id": "libgio-2_0-0-2.48.2-12.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-fam-2.48.2-12.52.1.ppc64le",
"product": {
"name": "libgio-fam-2.48.2-12.52.1.ppc64le",
"product_id": "libgio-fam-2.48.2-12.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"product": {
"name": "libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"product_id": "libglib-2_0-0-2.48.2-12.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"product_id": "libgmodule-2_0-0-2.48.2-12.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"product_id": "libgobject-2_0-0-2.48.2-12.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"product": {
"name": "libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"product_id": "libgthread-2_0-0-2.48.2-12.52.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.48.2-12.52.1.s390",
"product": {
"name": "glib2-devel-2.48.2-12.52.1.s390",
"product_id": "glib2-devel-2.48.2-12.52.1.s390"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.48.2-12.52.1.s390",
"product": {
"name": "glib2-devel-static-2.48.2-12.52.1.s390",
"product_id": "glib2-devel-static-2.48.2-12.52.1.s390"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.48.2-12.52.1.s390",
"product": {
"name": "glib2-tools-2.48.2-12.52.1.s390",
"product_id": "glib2-tools-2.48.2-12.52.1.s390"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.48.2-12.52.1.s390",
"product": {
"name": "libgio-2_0-0-2.48.2-12.52.1.s390",
"product_id": "libgio-2_0-0-2.48.2-12.52.1.s390"
}
},
{
"category": "product_version",
"name": "libgio-fam-2.48.2-12.52.1.s390",
"product": {
"name": "libgio-fam-2.48.2-12.52.1.s390",
"product_id": "libgio-fam-2.48.2-12.52.1.s390"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.48.2-12.52.1.s390",
"product": {
"name": "libglib-2_0-0-2.48.2-12.52.1.s390",
"product_id": "libglib-2_0-0-2.48.2-12.52.1.s390"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.48.2-12.52.1.s390",
"product": {
"name": "libgmodule-2_0-0-2.48.2-12.52.1.s390",
"product_id": "libgmodule-2_0-0-2.48.2-12.52.1.s390"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.48.2-12.52.1.s390",
"product": {
"name": "libgobject-2_0-0-2.48.2-12.52.1.s390",
"product_id": "libgobject-2_0-0-2.48.2-12.52.1.s390"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.48.2-12.52.1.s390",
"product": {
"name": "libgthread-2_0-0-2.48.2-12.52.1.s390",
"product_id": "libgthread-2_0-0-2.48.2-12.52.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.48.2-12.52.1.s390x",
"product": {
"name": "glib2-devel-2.48.2-12.52.1.s390x",
"product_id": "glib2-devel-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.48.2-12.52.1.s390x",
"product": {
"name": "glib2-devel-32bit-2.48.2-12.52.1.s390x",
"product_id": "glib2-devel-32bit-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.48.2-12.52.1.s390x",
"product": {
"name": "glib2-devel-static-2.48.2-12.52.1.s390x",
"product_id": "glib2-devel-static-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.48.2-12.52.1.s390x",
"product": {
"name": "glib2-tools-2.48.2-12.52.1.s390x",
"product_id": "glib2-tools-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.48.2-12.52.1.s390x",
"product": {
"name": "glib2-tools-32bit-2.48.2-12.52.1.s390x",
"product_id": "glib2-tools-32bit-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.48.2-12.52.1.s390x",
"product": {
"name": "libgio-2_0-0-2.48.2-12.52.1.s390x",
"product_id": "libgio-2_0-0-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"product": {
"name": "libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"product_id": "libgio-2_0-0-32bit-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-fam-2.48.2-12.52.1.s390x",
"product": {
"name": "libgio-fam-2.48.2-12.52.1.s390x",
"product_id": "libgio-fam-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-fam-32bit-2.48.2-12.52.1.s390x",
"product": {
"name": "libgio-fam-32bit-2.48.2-12.52.1.s390x",
"product_id": "libgio-fam-32bit-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.48.2-12.52.1.s390x",
"product": {
"name": "libglib-2_0-0-2.48.2-12.52.1.s390x",
"product_id": "libglib-2_0-0-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"product": {
"name": "libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"product_id": "libglib-2_0-0-32bit-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"product_id": "libgmodule-2_0-0-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"product": {
"name": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"product_id": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.48.2-12.52.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.48.2-12.52.1.s390x",
"product_id": "libgobject-2_0-0-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"product": {
"name": "libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"product_id": "libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.48.2-12.52.1.s390x",
"product": {
"name": "libgthread-2_0-0-2.48.2-12.52.1.s390x",
"product_id": "libgthread-2_0-0-2.48.2-12.52.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"product": {
"name": "libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"product_id": "libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.48.2-12.52.1.x86_64",
"product": {
"name": "glib2-devel-2.48.2-12.52.1.x86_64",
"product_id": "glib2-devel-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.48.2-12.52.1.x86_64",
"product": {
"name": "glib2-devel-32bit-2.48.2-12.52.1.x86_64",
"product_id": "glib2-devel-32bit-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.48.2-12.52.1.x86_64",
"product": {
"name": "glib2-devel-static-2.48.2-12.52.1.x86_64",
"product_id": "glib2-devel-static-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.48.2-12.52.1.x86_64",
"product": {
"name": "glib2-tools-2.48.2-12.52.1.x86_64",
"product_id": "glib2-tools-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.48.2-12.52.1.x86_64",
"product": {
"name": "glib2-tools-32bit-2.48.2-12.52.1.x86_64",
"product_id": "glib2-tools-32bit-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.48.2-12.52.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.48.2-12.52.1.x86_64",
"product_id": "libgio-2_0-0-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"product": {
"name": "libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"product_id": "libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-fam-2.48.2-12.52.1.x86_64",
"product": {
"name": "libgio-fam-2.48.2-12.52.1.x86_64",
"product_id": "libgio-fam-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-fam-32bit-2.48.2-12.52.1.x86_64",
"product": {
"name": "libgio-fam-32bit-2.48.2-12.52.1.x86_64",
"product_id": "libgio-fam-32bit-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.48.2-12.52.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.48.2-12.52.1.x86_64",
"product_id": "libglib-2_0-0-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"product": {
"name": "libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"product_id": "libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"product_id": "libgmodule-2_0-0-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"product_id": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"product_id": "libgobject-2_0-0-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"product": {
"name": "libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"product_id": "libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"product": {
"name": "libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"product_id": "libgthread-2_0-0-2.48.2-12.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"product": {
"name": "libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"product_id": "libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.48.2-12.52.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.aarch64"
},
"product_reference": "glib2-devel-2.48.2-12.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.48.2-12.52.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.ppc64le"
},
"product_reference": "glib2-devel-2.48.2-12.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.s390x"
},
"product_reference": "glib2-devel-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.x86_64"
},
"product_reference": "glib2-devel-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.48.2-12.52.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.aarch64"
},
"product_reference": "glib2-devel-static-2.48.2-12.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.48.2-12.52.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.ppc64le"
},
"product_reference": "glib2-devel-static-2.48.2-12.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.s390x"
},
"product_reference": "glib2-devel-static-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.x86_64"
},
"product_reference": "glib2-devel-static-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.48.2-12.52.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-lang-2.48.2-12.52.1.noarch"
},
"product_reference": "glib2-lang-2.48.2-12.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.48.2-12.52.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.aarch64"
},
"product_reference": "glib2-tools-2.48.2-12.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.48.2-12.52.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.ppc64le"
},
"product_reference": "glib2-tools-2.48.2-12.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.s390x"
},
"product_reference": "glib2-tools-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.x86_64"
},
"product_reference": "glib2-tools-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.48.2-12.52.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.48.2-12.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.48.2-12.52.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.s390x"
},
"product_reference": "libgio-2_0-0-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.s390x"
},
"product_reference": "libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.48.2-12.52.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.48.2-12.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.48.2-12.52.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.s390x"
},
"product_reference": "libglib-2_0-0-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.s390x"
},
"product_reference": "libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.48.2-12.52.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.48.2-12.52.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x"
},
"product_reference": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.48.2-12.52.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.48.2-12.52.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x"
},
"product_reference": "libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.48.2-12.52.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.48.2-12.52.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x"
},
"product_reference": "libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-2.48.2-12.52.1.x86_64"
},
"product_reference": "glib2-devel-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-static-2.48.2-12.52.1.x86_64"
},
"product_reference": "glib2-devel-static-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.48.2-12.52.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-lang-2.48.2-12.52.1.noarch"
},
"product_reference": "glib2-lang-2.48.2-12.52.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-tools-2.48.2-12.52.1.x86_64"
},
"product_reference": "glib2-tools-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-2.48.2-12.52.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
},
"product_reference": "libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13601"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13601",
"url": "https://www.suse.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "SUSE Bug 1254297 for CVE-2025-13601",
"url": "https://bugzilla.suse.com/1254297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T16:15:21Z",
"details": "important"
}
],
"title": "CVE-2025-13601"
},
{
"cve": "CVE-2025-14087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14087"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14087",
"url": "https://www.suse.com/security/cve/CVE-2025-14087"
},
{
"category": "external",
"summary": "SUSE Bug 1254662 for CVE-2025-14087",
"url": "https://bugzilla.suse.com/1254662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T16:15:21Z",
"details": "important"
}
],
"title": "CVE-2025-14087"
},
{
"cve": "CVE-2025-14512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14512"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib\u0027s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14512",
"url": "https://www.suse.com/security/cve/CVE-2025-14512"
},
{
"category": "external",
"summary": "SUSE Bug 1254878 for CVE-2025-14512",
"url": "https://bugzilla.suse.com/1254878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-devel-static-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-lang-2.48.2-12.52.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:glib2-tools-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgio-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libglib-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgmodule-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgobject-2_0-0-32bit-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-2.48.2-12.52.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgthread-2_0-0-32bit-2.48.2-12.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T16:15:21Z",
"details": "moderate"
}
],
"title": "CVE-2025-14512"
}
]
}
SUSE-SU-2025:4442-1
Vulnerability from csaf_suse - Published: 2025-12-17 16:17 - Updated: 2025-12-17 16:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glib2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glib2 fixes the following issues:\n\n- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote\n filesystem attribute values can lead to denial-of-service (bsc#1254878).\n- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()`functions when\n processing attacker-influenced data may lead to crash or code execution (bsc#1254662).\n- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a\n large number of unacceptable characters may lead to crash or code execution (bsc#1254297).\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4442,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4442,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4442,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4442,SUSE-SUSE-MicroOS-5.2-2025-4442,SUSE-Storage-7.1-2025-4442",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4442-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4442-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254442-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4442-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023584.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254297",
"url": "https://bugzilla.suse.com/1254297"
},
{
"category": "self",
"summary": "SUSE Bug 1254662",
"url": "https://bugzilla.suse.com/1254662"
},
{
"category": "self",
"summary": "SUSE Bug 1254878",
"url": "https://bugzilla.suse.com/1254878"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13601 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14512 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14512/"
}
],
"title": "Security update for glib2",
"tracking": {
"current_release_date": "2025-12-17T16:17:51Z",
"generator": {
"date": "2025-12-17T16:17:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4442-1",
"initial_release_date": "2025-12-17T16:17:51Z",
"revision_history": [
{
"date": "2025-12-17T16:17:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.62.6-150200.3.36.1.aarch64",
"product": {
"name": "glib2-devel-2.62.6-150200.3.36.1.aarch64",
"product_id": "glib2-devel-2.62.6-150200.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.62.6-150200.3.36.1.aarch64",
"product": {
"name": "glib2-devel-static-2.62.6-150200.3.36.1.aarch64",
"product_id": "glib2-devel-static-2.62.6-150200.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tests-2.62.6-150200.3.36.1.aarch64",
"product": {
"name": "glib2-tests-2.62.6-150200.3.36.1.aarch64",
"product_id": "glib2-tests-2.62.6-150200.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.62.6-150200.3.36.1.aarch64",
"product": {
"name": "glib2-tools-2.62.6-150200.3.36.1.aarch64",
"product_id": "glib2-tools-2.62.6-150200.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"product_id": "libgio-2_0-0-2.62.6-150200.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-fam-2.62.6-150200.3.36.1.aarch64",
"product": {
"name": "libgio-fam-2.62.6-150200.3.36.1.aarch64",
"product_id": "libgio-fam-2.62.6-150200.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"product_id": "libglib-2_0-0-2.62.6-150200.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"product_id": "libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"product_id": "libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"product": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"product_id": "libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product": {
"name": "glib2-devel-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product_id": "glib2-devel-64bit-2.62.6-150200.3.36.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "glib2-tools-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product": {
"name": "glib2-tools-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product_id": "glib2-tools-64bit-2.62.6-150200.3.36.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product": {
"name": "libgio-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product_id": "libgio-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgio-fam-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product": {
"name": "libgio-fam-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product_id": "libgio-fam-64bit-2.62.6-150200.3.36.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product": {
"name": "libglib-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product_id": "libglib-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product": {
"name": "libgmodule-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product_id": "libgmodule-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product": {
"name": "libgobject-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product_id": "libgobject-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product": {
"name": "libgthread-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32",
"product_id": "libgthread-2_0-0-64bit-2.62.6-150200.3.36.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.62.6-150200.3.36.1.i586",
"product": {
"name": "glib2-devel-2.62.6-150200.3.36.1.i586",
"product_id": "glib2-devel-2.62.6-150200.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.62.6-150200.3.36.1.i586",
"product": {
"name": "glib2-devel-static-2.62.6-150200.3.36.1.i586",
"product_id": "glib2-devel-static-2.62.6-150200.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-tests-2.62.6-150200.3.36.1.i586",
"product": {
"name": "glib2-tests-2.62.6-150200.3.36.1.i586",
"product_id": "glib2-tests-2.62.6-150200.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.62.6-150200.3.36.1.i586",
"product": {
"name": "glib2-tools-2.62.6-150200.3.36.1.i586",
"product_id": "glib2-tools-2.62.6-150200.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.i586",
"product": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.i586",
"product_id": "libgio-2_0-0-2.62.6-150200.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "libgio-fam-2.62.6-150200.3.36.1.i586",
"product": {
"name": "libgio-fam-2.62.6-150200.3.36.1.i586",
"product_id": "libgio-fam-2.62.6-150200.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.i586",
"product": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.i586",
"product_id": "libglib-2_0-0-2.62.6-150200.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.i586",
"product": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.i586",
"product_id": "libgmodule-2_0-0-2.62.6-150200.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.i586",
"product": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.i586",
"product_id": "libgobject-2_0-0-2.62.6-150200.3.36.1.i586"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.i586",
"product": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.i586",
"product_id": "libgthread-2_0-0-2.62.6-150200.3.36.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.62.6-150200.3.36.1.noarch",
"product": {
"name": "gio-branding-upstream-2.62.6-150200.3.36.1.noarch",
"product_id": "gio-branding-upstream-2.62.6-150200.3.36.1.noarch"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.62.6-150200.3.36.1.noarch",
"product": {
"name": "glib2-lang-2.62.6-150200.3.36.1.noarch",
"product_id": "glib2-lang-2.62.6-150200.3.36.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"product": {
"name": "glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"product_id": "glib2-devel-2.62.6-150200.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.62.6-150200.3.36.1.ppc64le",
"product": {
"name": "glib2-devel-static-2.62.6-150200.3.36.1.ppc64le",
"product_id": "glib2-devel-static-2.62.6-150200.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tests-2.62.6-150200.3.36.1.ppc64le",
"product": {
"name": "glib2-tests-2.62.6-150200.3.36.1.ppc64le",
"product_id": "glib2-tests-2.62.6-150200.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"product": {
"name": "glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"product_id": "glib2-tools-2.62.6-150200.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"product": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"product_id": "libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-fam-2.62.6-150200.3.36.1.ppc64le",
"product": {
"name": "libgio-fam-2.62.6-150200.3.36.1.ppc64le",
"product_id": "libgio-fam-2.62.6-150200.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"product": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"product_id": "libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"product_id": "libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"product_id": "libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"product": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"product_id": "libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.62.6-150200.3.36.1.s390x",
"product": {
"name": "glib2-devel-2.62.6-150200.3.36.1.s390x",
"product_id": "glib2-devel-2.62.6-150200.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.62.6-150200.3.36.1.s390x",
"product": {
"name": "glib2-devel-static-2.62.6-150200.3.36.1.s390x",
"product_id": "glib2-devel-static-2.62.6-150200.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tests-2.62.6-150200.3.36.1.s390x",
"product": {
"name": "glib2-tests-2.62.6-150200.3.36.1.s390x",
"product_id": "glib2-tests-2.62.6-150200.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.62.6-150200.3.36.1.s390x",
"product": {
"name": "glib2-tools-2.62.6-150200.3.36.1.s390x",
"product_id": "glib2-tools-2.62.6-150200.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"product": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"product_id": "libgio-2_0-0-2.62.6-150200.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-fam-2.62.6-150200.3.36.1.s390x",
"product": {
"name": "libgio-fam-2.62.6-150200.3.36.1.s390x",
"product_id": "libgio-fam-2.62.6-150200.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"product": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"product_id": "libglib-2_0-0-2.62.6-150200.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"product_id": "libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"product_id": "libgobject-2_0-0-2.62.6-150200.3.36.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"product": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"product_id": "libgthread-2_0-0-2.62.6-150200.3.36.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "glib2-devel-2.62.6-150200.3.36.1.x86_64",
"product_id": "glib2-devel-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "glib2-devel-32bit-2.62.6-150200.3.36.1.x86_64",
"product_id": "glib2-devel-32bit-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "glib2-devel-static-2.62.6-150200.3.36.1.x86_64",
"product_id": "glib2-devel-static-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tests-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "glib2-tests-2.62.6-150200.3.36.1.x86_64",
"product_id": "glib2-tests-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "glib2-tools-2.62.6-150200.3.36.1.x86_64",
"product_id": "glib2-tools-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "glib2-tools-32bit-2.62.6-150200.3.36.1.x86_64",
"product_id": "glib2-tools-32bit-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"product_id": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"product_id": "libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-fam-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libgio-fam-2.62.6-150200.3.36.1.x86_64",
"product_id": "libgio-fam-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-fam-32bit-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libgio-fam-32bit-2.62.6-150200.3.36.1.x86_64",
"product_id": "libgio-fam-32bit-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"product_id": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"product_id": "libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"product_id": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"product_id": "libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"product_id": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"product_id": "libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"product_id": "libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"product": {
"name": "libgthread-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"product_id": "libgthread-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "glib2-devel-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "glib2-devel-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.62.6-150200.3.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch"
},
"product_reference": "glib2-lang-2.62.6-150200.3.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "glib2-devel-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "glib2-devel-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "glib2-devel-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.62.6-150200.3.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch"
},
"product_reference": "glib2-lang-2.62.6-150200.3.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "glib2-devel-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.62.6-150200.3.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-lang-2.62.6-150200.3.36.1.noarch"
},
"product_reference": "glib2-lang-2.62.6-150200.3.36.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.62.6-150200.3.36.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "glib2-devel-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.62.6-150200.3.36.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "glib2-devel-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.62.6-150200.3.36.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:glib2-lang-2.62.6-150200.3.36.1.noarch"
},
"product_reference": "glib2-lang-2.62.6-150200.3.36.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.62.6-150200.3.36.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "glib2-tools-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13601"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13601",
"url": "https://www.suse.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "SUSE Bug 1254297 for CVE-2025-13601",
"url": "https://bugzilla.suse.com/1254297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T16:17:51Z",
"details": "important"
}
],
"title": "CVE-2025-13601"
},
{
"cve": "CVE-2025-14087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14087"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14087",
"url": "https://www.suse.com/security/cve/CVE-2025-14087"
},
{
"category": "external",
"summary": "SUSE Bug 1254662 for CVE-2025-14087",
"url": "https://bugzilla.suse.com/1254662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T16:17:51Z",
"details": "important"
}
],
"title": "CVE-2025-14087"
},
{
"cve": "CVE-2025-14512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14512"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib\u0027s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14512",
"url": "https://www.suse.com/security/cve/CVE-2025-14512"
},
{
"category": "external",
"summary": "SUSE Bug 1254878 for CVE-2025-14512",
"url": "https://bugzilla.suse.com/1254878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Enterprise Storage 7.1:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-devel-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-lang-2.62.6-150200.3.36.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:glib2-tools-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgio-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libglib-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgmodule-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgobject-2_0-0-32bit-2.62.6-150200.3.36.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgthread-2_0-0-2.62.6-150200.3.36.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T16:17:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-14512"
}
]
}
SUSE-SU-2025:4504-1
Vulnerability from csaf_suse - Published: 2025-12-22 16:30 - Updated: 2025-12-22 16:30Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glib2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glib2 fixes the following issues:\n\n- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote\n filesystem attribute values can lead to denial-of-service (bsc#1254878).\n- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when\n processing attacker-influenced data may lead to crash or code execution (bsc#1254662).\n- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a\n large number of unacceptable characters may lead to crash or code execution (bsc#1254297).\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4504,SUSE-SLE-Micro-5.3-2025-4504,SUSE-SLE-Micro-5.4-2025-4504,SUSE-SLE-Micro-5.5-2025-4504,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4504,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4504,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4504,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4504,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4504,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4504,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4504,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4504,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4504,SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4504",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4504-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4504-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254504-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4504-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023641.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254297",
"url": "https://bugzilla.suse.com/1254297"
},
{
"category": "self",
"summary": "SUSE Bug 1254662",
"url": "https://bugzilla.suse.com/1254662"
},
{
"category": "self",
"summary": "SUSE Bug 1254878",
"url": "https://bugzilla.suse.com/1254878"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13601 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14512 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14512/"
}
],
"title": "Security update for glib2",
"tracking": {
"current_release_date": "2025-12-22T16:30:38Z",
"generator": {
"date": "2025-12-22T16:30:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4504-1",
"initial_release_date": "2025-12-22T16:30:38Z",
"revision_history": [
{
"date": "2025-12-22T16:30:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.70.5-150400.3.29.1.aarch64",
"product": {
"name": "glib2-devel-2.70.5-150400.3.29.1.aarch64",
"product_id": "glib2-devel-2.70.5-150400.3.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.70.5-150400.3.29.1.aarch64",
"product": {
"name": "glib2-devel-static-2.70.5-150400.3.29.1.aarch64",
"product_id": "glib2-devel-static-2.70.5-150400.3.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.70.5-150400.3.29.1.aarch64",
"product": {
"name": "glib2-doc-2.70.5-150400.3.29.1.aarch64",
"product_id": "glib2-doc-2.70.5-150400.3.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.70.5-150400.3.29.1.aarch64",
"product": {
"name": "glib2-tests-devel-2.70.5-150400.3.29.1.aarch64",
"product_id": "glib2-tests-devel-2.70.5-150400.3.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.70.5-150400.3.29.1.aarch64",
"product": {
"name": "glib2-tools-2.70.5-150400.3.29.1.aarch64",
"product_id": "glib2-tools-2.70.5-150400.3.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"product_id": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"product_id": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"product_id": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"product_id": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"product": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"product_id": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product": {
"name": "glib2-devel-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product_id": "glib2-devel-64bit-2.70.5-150400.3.29.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "glib2-tools-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product": {
"name": "glib2-tools-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product_id": "glib2-tools-64bit-2.70.5-150400.3.29.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product": {
"name": "libgio-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product_id": "libgio-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product": {
"name": "libglib-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product_id": "libglib-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product": {
"name": "libgmodule-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product_id": "libgmodule-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product": {
"name": "libgobject-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product_id": "libgobject-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product": {
"name": "libgthread-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32",
"product_id": "libgthread-2_0-0-64bit-2.70.5-150400.3.29.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.70.5-150400.3.29.1.i586",
"product": {
"name": "glib2-devel-2.70.5-150400.3.29.1.i586",
"product_id": "glib2-devel-2.70.5-150400.3.29.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.70.5-150400.3.29.1.i586",
"product": {
"name": "glib2-devel-static-2.70.5-150400.3.29.1.i586",
"product_id": "glib2-devel-static-2.70.5-150400.3.29.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.70.5-150400.3.29.1.i586",
"product": {
"name": "glib2-doc-2.70.5-150400.3.29.1.i586",
"product_id": "glib2-doc-2.70.5-150400.3.29.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.70.5-150400.3.29.1.i586",
"product": {
"name": "glib2-tests-devel-2.70.5-150400.3.29.1.i586",
"product_id": "glib2-tests-devel-2.70.5-150400.3.29.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.70.5-150400.3.29.1.i586",
"product": {
"name": "glib2-tools-2.70.5-150400.3.29.1.i586",
"product_id": "glib2-tools-2.70.5-150400.3.29.1.i586"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.i586",
"product": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.i586",
"product_id": "libgio-2_0-0-2.70.5-150400.3.29.1.i586"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.i586",
"product": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.i586",
"product_id": "libglib-2_0-0-2.70.5-150400.3.29.1.i586"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.i586",
"product": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.i586",
"product_id": "libgmodule-2_0-0-2.70.5-150400.3.29.1.i586"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.i586",
"product": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.i586",
"product_id": "libgobject-2_0-0-2.70.5-150400.3.29.1.i586"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.i586",
"product": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.i586",
"product_id": "libgthread-2_0-0-2.70.5-150400.3.29.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.70.5-150400.3.29.1.noarch",
"product": {
"name": "gio-branding-upstream-2.70.5-150400.3.29.1.noarch",
"product_id": "gio-branding-upstream-2.70.5-150400.3.29.1.noarch"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"product": {
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"product_id": "glib2-lang-2.70.5-150400.3.29.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"product": {
"name": "glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"product_id": "glib2-devel-2.70.5-150400.3.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.70.5-150400.3.29.1.ppc64le",
"product": {
"name": "glib2-devel-static-2.70.5-150400.3.29.1.ppc64le",
"product_id": "glib2-devel-static-2.70.5-150400.3.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.70.5-150400.3.29.1.ppc64le",
"product": {
"name": "glib2-doc-2.70.5-150400.3.29.1.ppc64le",
"product_id": "glib2-doc-2.70.5-150400.3.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.70.5-150400.3.29.1.ppc64le",
"product": {
"name": "glib2-tests-devel-2.70.5-150400.3.29.1.ppc64le",
"product_id": "glib2-tests-devel-2.70.5-150400.3.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"product": {
"name": "glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"product_id": "glib2-tools-2.70.5-150400.3.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"product": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"product_id": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"product": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"product_id": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"product_id": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"product_id": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"product": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"product_id": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.70.5-150400.3.29.1.s390x",
"product": {
"name": "glib2-devel-2.70.5-150400.3.29.1.s390x",
"product_id": "glib2-devel-2.70.5-150400.3.29.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.70.5-150400.3.29.1.s390x",
"product": {
"name": "glib2-devel-static-2.70.5-150400.3.29.1.s390x",
"product_id": "glib2-devel-static-2.70.5-150400.3.29.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.70.5-150400.3.29.1.s390x",
"product": {
"name": "glib2-doc-2.70.5-150400.3.29.1.s390x",
"product_id": "glib2-doc-2.70.5-150400.3.29.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.70.5-150400.3.29.1.s390x",
"product": {
"name": "glib2-tests-devel-2.70.5-150400.3.29.1.s390x",
"product_id": "glib2-tests-devel-2.70.5-150400.3.29.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.70.5-150400.3.29.1.s390x",
"product": {
"name": "glib2-tools-2.70.5-150400.3.29.1.s390x",
"product_id": "glib2-tools-2.70.5-150400.3.29.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"product": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"product_id": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"product": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"product_id": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"product_id": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"product_id": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"product": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"product_id": "libgthread-2_0-0-2.70.5-150400.3.29.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"product_id": "glib2-devel-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "glib2-devel-32bit-2.70.5-150400.3.29.1.x86_64",
"product_id": "glib2-devel-32bit-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "glib2-devel-static-2.70.5-150400.3.29.1.x86_64",
"product_id": "glib2-devel-static-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "glib2-doc-2.70.5-150400.3.29.1.x86_64",
"product_id": "glib2-doc-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "glib2-tests-devel-2.70.5-150400.3.29.1.x86_64",
"product_id": "glib2-tests-devel-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"product_id": "glib2-tools-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "glib2-tools-32bit-2.70.5-150400.3.29.1.x86_64",
"product_id": "glib2-tools-32bit-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"product_id": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"product_id": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"product_id": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"product_id": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"product_id": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"product_id": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"product_id": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"product_id": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"product_id": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"product": {
"name": "libgthread-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"product_id": "libgthread-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy LTS 4.3",
"product": {
"name": "SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy-lts:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server LTS 4.3",
"product": {
"name": "SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server-lts:4.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch"
},
"product_reference": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch"
},
"product_reference": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch"
},
"product_reference": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch"
},
"product_reference": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch"
},
"product_reference": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch"
},
"product_reference": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-lang-2.70.5-150400.3.29.1.noarch"
},
"product_reference": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-lang-2.70.5-150400.3.29.1.noarch"
},
"product_reference": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch"
},
"product_reference": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-devel-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.70.5-150400.3.29.1.noarch as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch"
},
"product_reference": "glib2-lang-2.70.5-150400.3.29.1.noarch",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "glib2-tools-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13601"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Proxy LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13601",
"url": "https://www.suse.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "SUSE Bug 1254297 for CVE-2025-13601",
"url": "https://bugzilla.suse.com/1254297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Proxy LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Proxy LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:30:38Z",
"details": "important"
}
],
"title": "CVE-2025-13601"
},
{
"cve": "CVE-2025-14087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14087"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Proxy LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14087",
"url": "https://www.suse.com/security/cve/CVE-2025-14087"
},
{
"category": "external",
"summary": "SUSE Bug 1254662 for CVE-2025-14087",
"url": "https://bugzilla.suse.com/1254662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Proxy LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Proxy LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:30:38Z",
"details": "important"
}
],
"title": "CVE-2025-14087"
},
{
"cve": "CVE-2025-14512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14512"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib\u0027s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Proxy LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14512",
"url": "https://www.suse.com/security/cve/CVE-2025-14512"
},
{
"category": "external",
"summary": "SUSE Bug 1254878 for CVE-2025-14512",
"url": "https://bugzilla.suse.com/1254878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Proxy LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Proxy LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-devel-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:glib2-lang-2.70.5-150400.3.29.1.noarch",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:glib2-tools-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgio-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libglib-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgobject-2_0-0-32bit-2.70.5-150400.3.29.1.x86_64",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.ppc64le",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.s390x",
"SUSE Manager Server LTS 4.3:libgthread-2_0-0-2.70.5-150400.3.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-22T16:30:38Z",
"details": "moderate"
}
],
"title": "CVE-2025-14512"
}
]
}
SUSE-SU-2026:20032-1
Vulnerability from csaf_suse - Published: 2026-01-12 11:58 - Updated: 2026-01-12 11:58Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glib2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glib2 fixes the following issues:\n\nUpdate to version 2.84.4.\n\nSecurity issues fixed:\n\n- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote\n filesystem attribute values can lead to denial-of-service (bsc#1254878).\n- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when\n processing attacker-influenced data may lead to crash or code execution (bsc#1254662).\n- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a\n large number of unacceptable characters may lead to crash or code execution (bsc#1254297).\n- CVE-2025-7039: integer overflow when creating temporary files may lead to an out-of-bounds memory access that can be\n used for path traversal or exposure of sensitive content in a temporary file (bsc#1249055).\n\nOther issues fixed and changes:\n\n- Fix GFile leak in `g_local_file_set_display_name` during error handling.\n- Fix incorrect output parameter handling in closure helper of `g_settings_bind_with_mapping_closures`.\n- `gfileutils`: fix computation of temporary file name.\n- Fix GFile leak in `g_local_file_set_display_name()`.\n- `gthreadpool`: catch `pool_spawner` creation failure.\n- `gio/filenamecompleter`: fix leaks.\n- `gfilenamecompleter`: fix `g_object_unref()` of undefined value.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-132",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20032-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20032-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620032-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20032-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html"
},
{
"category": "self",
"summary": "SUSE Bug 1249055",
"url": "https://bugzilla.suse.com/1249055"
},
{
"category": "self",
"summary": "SUSE Bug 1254297",
"url": "https://bugzilla.suse.com/1254297"
},
{
"category": "self",
"summary": "SUSE Bug 1254662",
"url": "https://bugzilla.suse.com/1254662"
},
{
"category": "self",
"summary": "SUSE Bug 1254878",
"url": "https://bugzilla.suse.com/1254878"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13601 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14512 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-7039 page",
"url": "https://www.suse.com/security/cve/CVE-2025-7039/"
}
],
"title": "Security update for glib2",
"tracking": {
"current_release_date": "2026-01-12T11:58:25Z",
"generator": {
"date": "2026-01-12T11:58:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20032-1",
"initial_release_date": "2026-01-12T11:58:25Z",
"revision_history": [
{
"date": "2026-01-12T11:58:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.84.4-160000.1.1.aarch64",
"product": {
"name": "glib2-devel-2.84.4-160000.1.1.aarch64",
"product_id": "glib2-devel-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.4-160000.1.1.aarch64",
"product": {
"name": "glib2-devel-static-2.84.4-160000.1.1.aarch64",
"product_id": "glib2-devel-static-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.84.4-160000.1.1.aarch64",
"product": {
"name": "glib2-doc-2.84.4-160000.1.1.aarch64",
"product_id": "glib2-doc-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.aarch64",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.aarch64",
"product_id": "glib2-tools-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-SLE-16-160000.2.2.noarch",
"product": {
"name": "gio-branding-SLE-16-160000.2.2.noarch",
"product_id": "gio-branding-SLE-16-160000.2.2.noarch"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.84.4-160000.1.1.noarch",
"product": {
"name": "glib2-lang-2.84.4-160000.1.1.noarch",
"product_id": "glib2-lang-2.84.4-160000.1.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "glib2-devel-2.84.4-160000.1.1.ppc64le",
"product_id": "glib2-devel-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"product_id": "glib2-devel-static-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "glib2-doc-2.84.4-160000.1.1.ppc64le",
"product_id": "glib2-doc-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.ppc64le",
"product_id": "glib2-tools-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.84.4-160000.1.1.s390x",
"product": {
"name": "glib2-devel-2.84.4-160000.1.1.s390x",
"product_id": "glib2-devel-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.4-160000.1.1.s390x",
"product": {
"name": "glib2-devel-static-2.84.4-160000.1.1.s390x",
"product_id": "glib2-devel-static-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.84.4-160000.1.1.s390x",
"product": {
"name": "glib2-doc-2.84.4-160000.1.1.s390x",
"product_id": "glib2-doc-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.s390x",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.s390x",
"product_id": "glib2-tools-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgthread-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.84.4-160000.1.1.x86_64",
"product": {
"name": "glib2-devel-2.84.4-160000.1.1.x86_64",
"product_id": "glib2-devel-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.4-160000.1.1.x86_64",
"product": {
"name": "glib2-devel-static-2.84.4-160000.1.1.x86_64",
"product_id": "glib2-devel-static-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.84.4-160000.1.1.x86_64",
"product": {
"name": "glib2-doc-2.84.4-160000.1.1.x86_64",
"product_id": "glib2-doc-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.x86_64",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.x86_64",
"product_id": "glib2-tools-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-SLE-16-160000.2.2.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch"
},
"product_reference": "gio-branding-SLE-16-160000.2.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.84.4-160000.1.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch"
},
"product_reference": "glib2-lang-2.84.4-160000.1.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-SLE-16-160000.2.2.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch"
},
"product_reference": "gio-branding-SLE-16-160000.2.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.84.4-160000.1.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch"
},
"product_reference": "glib2-lang-2.84.4-160000.1.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13601"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13601",
"url": "https://www.suse.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "SUSE Bug 1254297 for CVE-2025-13601",
"url": "https://bugzilla.suse.com/1254297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:58:25Z",
"details": "important"
}
],
"title": "CVE-2025-13601"
},
{
"cve": "CVE-2025-14087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14087"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14087",
"url": "https://www.suse.com/security/cve/CVE-2025-14087"
},
{
"category": "external",
"summary": "SUSE Bug 1254662 for CVE-2025-14087",
"url": "https://bugzilla.suse.com/1254662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:58:25Z",
"details": "important"
}
],
"title": "CVE-2025-14087"
},
{
"cve": "CVE-2025-14512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14512"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib\u0027s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14512",
"url": "https://www.suse.com/security/cve/CVE-2025-14512"
},
{
"category": "external",
"summary": "SUSE Bug 1254878 for CVE-2025-14512",
"url": "https://bugzilla.suse.com/1254878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:58:25Z",
"details": "moderate"
}
],
"title": "CVE-2025-14512"
},
{
"cve": "CVE-2025-7039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-7039"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-7039",
"url": "https://www.suse.com/security/cve/CVE-2025-7039"
},
{
"category": "external",
"summary": "SUSE Bug 1249055 for CVE-2025-7039",
"url": "https://bugzilla.suse.com/1249055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:58:25Z",
"details": "moderate"
}
],
"title": "CVE-2025-7039"
}
]
}
SUSE-SU-2026:20074-1
Vulnerability from csaf_suse - Published: 2026-01-12 11:58 - Updated: 2026-01-12 11:58Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glib2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glib2 fixes the following issues:\n\nUpdate to version 2.84.4.\n\nSecurity issues fixed:\n\n- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote\n filesystem attribute values can lead to denial-of-service (bsc#1254878).\n- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when\n processing attacker-influenced data may lead to crash or code execution (bsc#1254662).\n- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a\n large number of unacceptable characters may lead to crash or code execution (bsc#1254297).\n- CVE-2025-7039: integer overflow when creating temporary files may lead to an out-of-bounds memory access that can be\n used for path traversal or exposure of sensitive content in a temporary file (bsc#1249055).\n\nOther issues fixed and changes:\n\n- Fix GFile leak in `g_local_file_set_display_name` during error handling.\n- Fix incorrect output parameter handling in closure helper of `g_settings_bind_with_mapping_closures`.\n- `gfileutils`: fix computation of temporary file name.\n- Fix GFile leak in `g_local_file_set_display_name()`.\n- `gthreadpool`: catch `pool_spawner` creation failure.\n- `gio/filenamecompleter`: fix leaks.\n- `gfilenamecompleter`: fix `g_object_unref()` of undefined value.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SL-Micro-6.2-132",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20074-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20074-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620074-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20074-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023743.html"
},
{
"category": "self",
"summary": "SUSE Bug 1249055",
"url": "https://bugzilla.suse.com/1249055"
},
{
"category": "self",
"summary": "SUSE Bug 1254297",
"url": "https://bugzilla.suse.com/1254297"
},
{
"category": "self",
"summary": "SUSE Bug 1254662",
"url": "https://bugzilla.suse.com/1254662"
},
{
"category": "self",
"summary": "SUSE Bug 1254878",
"url": "https://bugzilla.suse.com/1254878"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13601 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14512 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-7039 page",
"url": "https://www.suse.com/security/cve/CVE-2025-7039/"
}
],
"title": "Security update for glib2",
"tracking": {
"current_release_date": "2026-01-12T11:58:25Z",
"generator": {
"date": "2026-01-12T11:58:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20074-1",
"initial_release_date": "2026-01-12T11:58:25Z",
"revision_history": [
{
"date": "2026-01-12T11:58:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.aarch64",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.aarch64",
"product_id": "glib2-tools-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-SLE-16-160000.2.2.noarch",
"product": {
"name": "gio-branding-SLE-16-160000.2.2.noarch",
"product_id": "gio-branding-SLE-16-160000.2.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.ppc64le",
"product_id": "glib2-tools-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.s390x",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.s390x",
"product_id": "glib2-tools-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.x86_64",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.x86_64",
"product_id": "glib2-tools-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:transactional"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-SLE-16-160000.2.2.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch"
},
"product_reference": "gio-branding-SLE-16-160000.2.2.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13601"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13601",
"url": "https://www.suse.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "SUSE Bug 1254297 for CVE-2025-13601",
"url": "https://bugzilla.suse.com/1254297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:58:25Z",
"details": "important"
}
],
"title": "CVE-2025-13601"
},
{
"cve": "CVE-2025-14087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14087"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14087",
"url": "https://www.suse.com/security/cve/CVE-2025-14087"
},
{
"category": "external",
"summary": "SUSE Bug 1254662 for CVE-2025-14087",
"url": "https://bugzilla.suse.com/1254662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:58:25Z",
"details": "important"
}
],
"title": "CVE-2025-14087"
},
{
"cve": "CVE-2025-14512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14512"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib\u0027s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14512",
"url": "https://www.suse.com/security/cve/CVE-2025-14512"
},
{
"category": "external",
"summary": "SUSE Bug 1254878 for CVE-2025-14512",
"url": "https://bugzilla.suse.com/1254878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:58:25Z",
"details": "moderate"
}
],
"title": "CVE-2025-14512"
},
{
"cve": "CVE-2025-7039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-7039"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-7039",
"url": "https://www.suse.com/security/cve/CVE-2025-7039"
},
{
"category": "external",
"summary": "SUSE Bug 1249055 for CVE-2025-7039",
"url": "https://bugzilla.suse.com/1249055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:gio-branding-SLE-16-160000.2.2.noarch",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:glib2-tools-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"SUSE Linux Micro 6.2:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:58:25Z",
"details": "moderate"
}
],
"title": "CVE-2025-7039"
}
]
}
SUSE-SU-2026:0018-1
Vulnerability from csaf_suse - Published: 2026-01-05 10:52 - Updated: 2026-01-05 10:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glib2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glib2 fixes the following issues:\n\n- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote\n filesystem attribute values can lead to denial-of-service (bsc#1254878).\n- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()`functions when\n processing attacker-influenced data may lead to crash or code execution (bsc#1254662).\n- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a\n large number of unacceptable characters may lead to crash or code execution (bsc#1254297).\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-18,SUSE-SLE-Module-Basesystem-15-SP7-2026-18,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-18,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-18,openSUSE-SLE-15.6-2026-18",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0018-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0018-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260018-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0018-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023670.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254297",
"url": "https://bugzilla.suse.com/1254297"
},
{
"category": "self",
"summary": "SUSE Bug 1254662",
"url": "https://bugzilla.suse.com/1254662"
},
{
"category": "self",
"summary": "SUSE Bug 1254878",
"url": "https://bugzilla.suse.com/1254878"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13601 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14512 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14512/"
}
],
"title": "Security update for glib2",
"tracking": {
"current_release_date": "2026-01-05T10:52:26Z",
"generator": {
"date": "2026-01-05T10:52:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0018-1",
"initial_release_date": "2026-01-05T10:52:26Z",
"revision_history": [
{
"date": "2026-01-05T10:52:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.78.6-150600.4.25.1.aarch64",
"product": {
"name": "glib2-devel-2.78.6-150600.4.25.1.aarch64",
"product_id": "glib2-devel-2.78.6-150600.4.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"product": {
"name": "glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"product_id": "glib2-devel-static-2.78.6-150600.4.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.78.6-150600.4.25.1.aarch64",
"product": {
"name": "glib2-doc-2.78.6-150600.4.25.1.aarch64",
"product_id": "glib2-doc-2.78.6-150600.4.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"product": {
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"product_id": "glib2-tests-devel-2.78.6-150600.4.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.78.6-150600.4.25.1.aarch64",
"product": {
"name": "glib2-tools-2.78.6-150600.4.25.1.aarch64",
"product_id": "glib2-tools-2.78.6-150600.4.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"product_id": "libgio-2_0-0-2.78.6-150600.4.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"product_id": "libglib-2_0-0-2.78.6-150600.4.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"product_id": "libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"product_id": "libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"product": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"product_id": "libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product": {
"name": "glib2-devel-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product_id": "glib2-devel-64bit-2.78.6-150600.4.25.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "glib2-tools-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product": {
"name": "glib2-tools-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product_id": "glib2-tools-64bit-2.78.6-150600.4.25.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product": {
"name": "libgio-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product_id": "libgio-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product": {
"name": "libglib-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product_id": "libglib-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product": {
"name": "libgmodule-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product_id": "libgmodule-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product": {
"name": "libgobject-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product_id": "libgobject-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product": {
"name": "libgthread-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32",
"product_id": "libgthread-2_0-0-64bit-2.78.6-150600.4.25.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.78.6-150600.4.25.1.i586",
"product": {
"name": "glib2-devel-2.78.6-150600.4.25.1.i586",
"product_id": "glib2-devel-2.78.6-150600.4.25.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.78.6-150600.4.25.1.i586",
"product": {
"name": "glib2-devel-static-2.78.6-150600.4.25.1.i586",
"product_id": "glib2-devel-static-2.78.6-150600.4.25.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.78.6-150600.4.25.1.i586",
"product": {
"name": "glib2-doc-2.78.6-150600.4.25.1.i586",
"product_id": "glib2-doc-2.78.6-150600.4.25.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.i586",
"product": {
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.i586",
"product_id": "glib2-tests-devel-2.78.6-150600.4.25.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.78.6-150600.4.25.1.i586",
"product": {
"name": "glib2-tools-2.78.6-150600.4.25.1.i586",
"product_id": "glib2-tools-2.78.6-150600.4.25.1.i586"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.i586",
"product": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.i586",
"product_id": "libgio-2_0-0-2.78.6-150600.4.25.1.i586"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.i586",
"product": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.i586",
"product_id": "libglib-2_0-0-2.78.6-150600.4.25.1.i586"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.i586",
"product": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.i586",
"product_id": "libgmodule-2_0-0-2.78.6-150600.4.25.1.i586"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.i586",
"product": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.i586",
"product_id": "libgobject-2_0-0-2.78.6-150600.4.25.1.i586"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.i586",
"product": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.i586",
"product_id": "libgthread-2_0-0-2.78.6-150600.4.25.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"product": {
"name": "gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"product_id": "gio-branding-upstream-2.78.6-150600.4.25.1.noarch"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.78.6-150600.4.25.1.noarch",
"product": {
"name": "glib2-lang-2.78.6-150600.4.25.1.noarch",
"product_id": "glib2-lang-2.78.6-150600.4.25.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"product": {
"name": "glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"product_id": "glib2-devel-2.78.6-150600.4.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"product": {
"name": "glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"product_id": "glib2-devel-static-2.78.6-150600.4.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"product": {
"name": "glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"product_id": "glib2-doc-2.78.6-150600.4.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"product": {
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"product_id": "glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"product": {
"name": "glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"product_id": "glib2-tools-2.78.6-150600.4.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"product": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"product_id": "libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"product": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"product_id": "libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"product_id": "libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"product_id": "libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"product": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"product_id": "libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.78.6-150600.4.25.1.s390x",
"product": {
"name": "glib2-devel-2.78.6-150600.4.25.1.s390x",
"product_id": "glib2-devel-2.78.6-150600.4.25.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"product": {
"name": "glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"product_id": "glib2-devel-static-2.78.6-150600.4.25.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.78.6-150600.4.25.1.s390x",
"product": {
"name": "glib2-doc-2.78.6-150600.4.25.1.s390x",
"product_id": "glib2-doc-2.78.6-150600.4.25.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"product": {
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"product_id": "glib2-tests-devel-2.78.6-150600.4.25.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.78.6-150600.4.25.1.s390x",
"product": {
"name": "glib2-tools-2.78.6-150600.4.25.1.s390x",
"product_id": "glib2-tools-2.78.6-150600.4.25.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"product": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"product_id": "libgio-2_0-0-2.78.6-150600.4.25.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"product": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"product_id": "libglib-2_0-0-2.78.6-150600.4.25.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"product_id": "libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"product_id": "libgobject-2_0-0-2.78.6-150600.4.25.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"product": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"product_id": "libgthread-2_0-0-2.78.6-150600.4.25.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "glib2-devel-2.78.6-150600.4.25.1.x86_64",
"product_id": "glib2-devel-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"product_id": "glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"product_id": "glib2-devel-static-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "glib2-doc-2.78.6-150600.4.25.1.x86_64",
"product_id": "glib2-doc-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"product_id": "glib2-tests-devel-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "glib2-tools-2.78.6-150600.4.25.1.x86_64",
"product_id": "glib2-tools-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"product_id": "glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"product_id": "libgio-2_0-0-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"product_id": "libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"product_id": "libglib-2_0-0-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"product_id": "libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"product_id": "libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"product_id": "libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"product_id": "libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"product_id": "libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"product_id": "libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"product": {
"name": "libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"product_id": "libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.78.6-150600.4.25.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.25.1.noarch"
},
"product_reference": "glib2-lang-2.78.6-150600.4.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.78.6-150600.4.25.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-lang-2.78.6-150600.4.25.1.noarch"
},
"product_reference": "glib2-lang-2.78.6-150600.4.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.78.6-150600.4.25.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-lang-2.78.6-150600.4.25.1.noarch"
},
"product_reference": "glib2-lang-2.78.6-150600.4.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-upstream-2.78.6-150600.4.25.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.25.1.noarch"
},
"product_reference": "gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.78.6-150600.4.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.78.6-150600.4.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.78.6-150600.4.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.78.6-150600.4.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "glib2-doc-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.78.6-150600.4.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.78.6-150600.4.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "glib2-doc-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-doc-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.78.6-150600.4.25.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.25.1.noarch"
},
"product_reference": "glib2-lang-2.78.6-150600.4.25.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
},
"product_reference": "libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13601"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13601",
"url": "https://www.suse.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "SUSE Bug 1254297 for CVE-2025-13601",
"url": "https://bugzilla.suse.com/1254297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T10:52:26Z",
"details": "important"
}
],
"title": "CVE-2025-13601"
},
{
"cve": "CVE-2025-14087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14087"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14087",
"url": "https://www.suse.com/security/cve/CVE-2025-14087"
},
{
"category": "external",
"summary": "SUSE Bug 1254662 for CVE-2025-14087",
"url": "https://bugzilla.suse.com/1254662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T10:52:26Z",
"details": "important"
}
],
"title": "CVE-2025-14087"
},
{
"cve": "CVE-2025-14512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14512"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib\u0027s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14512",
"url": "https://www.suse.com/security/cve/CVE-2025-14512"
},
{
"category": "external",
"summary": "SUSE Bug 1254878 for CVE-2025-14512",
"url": "https://bugzilla.suse.com/1254878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.25.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.25.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-05T10:52:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-14512"
}
]
}
SUSE-SU-2026:20045-1
Vulnerability from csaf_suse - Published: 2026-01-08 16:00 - Updated: 2026-01-08 16:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glib2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glib2 fixes the following issues:\n\n- CVE-2025-13601: Fixed Integer overflow in in g_escape_uri_string() (bsc#1254297)\n- CVE-2025-14087: Fixed buffer underflow in GVariant parser leads to heap corruption (bsc#1254662)\n- CVE-2025-14512: Fixed Integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow (bsc#1254878)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-550",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20045-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20045-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620045-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20045-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023762.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254297",
"url": "https://bugzilla.suse.com/1254297"
},
{
"category": "self",
"summary": "SUSE Bug 1254662",
"url": "https://bugzilla.suse.com/1254662"
},
{
"category": "self",
"summary": "SUSE Bug 1254878",
"url": "https://bugzilla.suse.com/1254878"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13601 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14512 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14512/"
}
],
"title": "Security update for glib2",
"tracking": {
"current_release_date": "2026-01-08T16:00:18Z",
"generator": {
"date": "2026-01-08T16:00:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20045-1",
"initial_release_date": "2026-01-08T16:00:18Z",
"revision_history": [
{
"date": "2026-01-08T16:00:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.76.2-11.1.aarch64",
"product": {
"name": "glib2-tools-2.76.2-11.1.aarch64",
"product_id": "glib2-tools-2.76.2-11.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.76.2-11.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.76.2-11.1.aarch64",
"product_id": "libgio-2_0-0-2.76.2-11.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.76.2-11.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.76.2-11.1.aarch64",
"product_id": "libglib-2_0-0-2.76.2-11.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.76.2-11.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.76.2-11.1.aarch64",
"product_id": "libgmodule-2_0-0-2.76.2-11.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.76.2-11.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.76.2-11.1.aarch64",
"product_id": "libgobject-2_0-0-2.76.2-11.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.76.2-11.1.s390x",
"product": {
"name": "glib2-tools-2.76.2-11.1.s390x",
"product_id": "glib2-tools-2.76.2-11.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.76.2-11.1.s390x",
"product": {
"name": "libgio-2_0-0-2.76.2-11.1.s390x",
"product_id": "libgio-2_0-0-2.76.2-11.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.76.2-11.1.s390x",
"product": {
"name": "libglib-2_0-0-2.76.2-11.1.s390x",
"product_id": "libglib-2_0-0-2.76.2-11.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.76.2-11.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.76.2-11.1.s390x",
"product_id": "libgmodule-2_0-0-2.76.2-11.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.76.2-11.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.76.2-11.1.s390x",
"product_id": "libgobject-2_0-0-2.76.2-11.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.76.2-11.1.x86_64",
"product": {
"name": "glib2-tools-2.76.2-11.1.x86_64",
"product_id": "glib2-tools-2.76.2-11.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.76.2-11.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.76.2-11.1.x86_64",
"product_id": "libgio-2_0-0-2.76.2-11.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.76.2-11.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.76.2-11.1.x86_64",
"product_id": "libglib-2_0-0-2.76.2-11.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.76.2-11.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.76.2-11.1.x86_64",
"product_id": "libgmodule-2_0-0-2.76.2-11.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.76.2-11.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.76.2-11.1.x86_64",
"product_id": "libgobject-2_0-0-2.76.2-11.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.76.2-11.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.aarch64"
},
"product_reference": "glib2-tools-2.76.2-11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.76.2-11.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.s390x"
},
"product_reference": "glib2-tools-2.76.2-11.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.76.2-11.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.x86_64"
},
"product_reference": "glib2-tools-2.76.2-11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.76.2-11.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.76.2-11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.76.2-11.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.s390x"
},
"product_reference": "libgio-2_0-0-2.76.2-11.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.76.2-11.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.76.2-11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.76.2-11.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.76.2-11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.76.2-11.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.s390x"
},
"product_reference": "libglib-2_0-0-2.76.2-11.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.76.2-11.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.76.2-11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.76.2-11.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.76.2-11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.76.2-11.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.76.2-11.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.76.2-11.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.76.2-11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.76.2-11.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.76.2-11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.76.2-11.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.76.2-11.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.76.2-11.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.76.2-11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13601"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13601",
"url": "https://www.suse.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "SUSE Bug 1254297 for CVE-2025-13601",
"url": "https://bugzilla.suse.com/1254297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T16:00:18Z",
"details": "important"
}
],
"title": "CVE-2025-13601"
},
{
"cve": "CVE-2025-14087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14087"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14087",
"url": "https://www.suse.com/security/cve/CVE-2025-14087"
},
{
"category": "external",
"summary": "SUSE Bug 1254662 for CVE-2025-14087",
"url": "https://bugzilla.suse.com/1254662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T16:00:18Z",
"details": "important"
}
],
"title": "CVE-2025-14087"
},
{
"cve": "CVE-2025-14512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14512"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib\u0027s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14512",
"url": "https://www.suse.com/security/cve/CVE-2025-14512"
},
{
"category": "external",
"summary": "SUSE Bug 1254878 for CVE-2025-14512",
"url": "https://bugzilla.suse.com/1254878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-11.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-08T16:00:18Z",
"details": "moderate"
}
],
"title": "CVE-2025-14512"
}
]
}
GHSA-V6C5-9MP4-MWQ4
Vulnerability from github – Published: 2025-11-26 15:34 – Updated: 2026-02-18 21:31A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
{
"affected": [],
"aliases": [
"CVE-2025-13601"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-11-26T15:15:51Z",
"severity": "HIGH"
},
"details": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"id": "GHSA-v6c5-9mp4-mwq4",
"modified": "2026-02-18T21:31:17Z",
"published": "2025-11-26T15:34:12Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13601"
},
{
"type": "WEB",
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
},
{
"type": "WEB",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2659"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2072"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2064"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1627"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1626"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1625"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1624"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1608"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1465"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1327"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1326"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1324"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:1323"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:0991"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:0975"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:0936"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
}
]
}
OPENSUSE-SU-2025:15810-1
Vulnerability from csaf_opensuse - Published: 2025-12-10 00:00 - Updated: 2025-12-10 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "gio-branding-upstream-2.86.3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the gio-branding-upstream-2.86.3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15810",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15810-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13601 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13601/"
}
],
"title": "gio-branding-upstream-2.86.3-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-10T00:00:00Z",
"generator": {
"date": "2025-12-10T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15810-1",
"initial_release_date": "2025-12-10T00:00:00Z",
"revision_history": [
{
"date": "2025-12-10T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.86.3-1.1.aarch64",
"product": {
"name": "gio-branding-upstream-2.86.3-1.1.aarch64",
"product_id": "gio-branding-upstream-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-2.86.3-1.1.aarch64",
"product": {
"name": "glib2-devel-2.86.3-1.1.aarch64",
"product_id": "glib2-devel-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.86.3-1.1.aarch64",
"product": {
"name": "glib2-devel-32bit-2.86.3-1.1.aarch64",
"product_id": "glib2-devel-32bit-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.86.3-1.1.aarch64",
"product": {
"name": "glib2-devel-static-2.86.3-1.1.aarch64",
"product_id": "glib2-devel-static-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.86.3-1.1.aarch64",
"product": {
"name": "glib2-lang-2.86.3-1.1.aarch64",
"product_id": "glib2-lang-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.86.3-1.1.aarch64",
"product": {
"name": "glib2-tests-devel-2.86.3-1.1.aarch64",
"product_id": "glib2-tests-devel-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.86.3-1.1.aarch64",
"product": {
"name": "glib2-tools-2.86.3-1.1.aarch64",
"product_id": "glib2-tools-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.86.3-1.1.aarch64",
"product": {
"name": "glib2-tools-32bit-2.86.3-1.1.aarch64",
"product_id": "glib2-tools-32bit-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.86.3-1.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.86.3-1.1.aarch64",
"product_id": "libgio-2_0-0-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.86.3-1.1.aarch64",
"product": {
"name": "libgio-2_0-0-32bit-2.86.3-1.1.aarch64",
"product_id": "libgio-2_0-0-32bit-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.86.3-1.1.aarch64",
"product": {
"name": "libgirepository-2_0-0-2.86.3-1.1.aarch64",
"product_id": "libgirepository-2_0-0-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.86.3-1.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.86.3-1.1.aarch64",
"product_id": "libglib-2_0-0-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.86.3-1.1.aarch64",
"product": {
"name": "libglib-2_0-0-32bit-2.86.3-1.1.aarch64",
"product_id": "libglib-2_0-0-32bit-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.86.3-1.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.86.3-1.1.aarch64",
"product_id": "libgmodule-2_0-0-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.aarch64",
"product_id": "libgmodule-2_0-0-32bit-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.86.3-1.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.86.3-1.1.aarch64",
"product_id": "libgobject-2_0-0-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.aarch64",
"product": {
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.aarch64",
"product_id": "libgobject-2_0-0-32bit-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.86.3-1.1.aarch64",
"product": {
"name": "libgthread-2_0-0-2.86.3-1.1.aarch64",
"product_id": "libgthread-2_0-0-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.aarch64",
"product": {
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.aarch64",
"product_id": "libgthread-2_0-0-32bit-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.aarch64",
"product_id": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.aarch64",
"product_id": "typelib-1_0-GLib-2_0-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.aarch64",
"product_id": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.aarch64",
"product_id": "typelib-1_0-GModule-2_0-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.aarch64",
"product_id": "typelib-1_0-GObject-2_0-2.86.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.aarch64",
"product_id": "typelib-1_0-Gio-2_0-2.86.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.86.3-1.1.ppc64le",
"product": {
"name": "gio-branding-upstream-2.86.3-1.1.ppc64le",
"product_id": "gio-branding-upstream-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-2.86.3-1.1.ppc64le",
"product": {
"name": "glib2-devel-2.86.3-1.1.ppc64le",
"product_id": "glib2-devel-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.86.3-1.1.ppc64le",
"product": {
"name": "glib2-devel-32bit-2.86.3-1.1.ppc64le",
"product_id": "glib2-devel-32bit-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.86.3-1.1.ppc64le",
"product": {
"name": "glib2-devel-static-2.86.3-1.1.ppc64le",
"product_id": "glib2-devel-static-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.86.3-1.1.ppc64le",
"product": {
"name": "glib2-lang-2.86.3-1.1.ppc64le",
"product_id": "glib2-lang-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.86.3-1.1.ppc64le",
"product": {
"name": "glib2-tests-devel-2.86.3-1.1.ppc64le",
"product_id": "glib2-tests-devel-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.86.3-1.1.ppc64le",
"product": {
"name": "glib2-tools-2.86.3-1.1.ppc64le",
"product_id": "glib2-tools-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.86.3-1.1.ppc64le",
"product": {
"name": "glib2-tools-32bit-2.86.3-1.1.ppc64le",
"product_id": "glib2-tools-32bit-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.86.3-1.1.ppc64le",
"product": {
"name": "libgio-2_0-0-2.86.3-1.1.ppc64le",
"product_id": "libgio-2_0-0-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.86.3-1.1.ppc64le",
"product": {
"name": "libgio-2_0-0-32bit-2.86.3-1.1.ppc64le",
"product_id": "libgio-2_0-0-32bit-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.86.3-1.1.ppc64le",
"product": {
"name": "libgirepository-2_0-0-2.86.3-1.1.ppc64le",
"product_id": "libgirepository-2_0-0-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.86.3-1.1.ppc64le",
"product": {
"name": "libglib-2_0-0-2.86.3-1.1.ppc64le",
"product_id": "libglib-2_0-0-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.86.3-1.1.ppc64le",
"product": {
"name": "libglib-2_0-0-32bit-2.86.3-1.1.ppc64le",
"product_id": "libglib-2_0-0-32bit-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.86.3-1.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-2.86.3-1.1.ppc64le",
"product_id": "libgmodule-2_0-0-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.ppc64le",
"product_id": "libgmodule-2_0-0-32bit-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.86.3-1.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-2.86.3-1.1.ppc64le",
"product_id": "libgobject-2_0-0-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.ppc64le",
"product_id": "libgobject-2_0-0-32bit-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.86.3-1.1.ppc64le",
"product": {
"name": "libgthread-2_0-0-2.86.3-1.1.ppc64le",
"product_id": "libgthread-2_0-0-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.ppc64le",
"product": {
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.ppc64le",
"product_id": "libgthread-2_0-0-32bit-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.ppc64le",
"product_id": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.ppc64le",
"product_id": "typelib-1_0-GLib-2_0-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.ppc64le",
"product_id": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.ppc64le",
"product_id": "typelib-1_0-GModule-2_0-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.ppc64le",
"product_id": "typelib-1_0-GObject-2_0-2.86.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.ppc64le",
"product_id": "typelib-1_0-Gio-2_0-2.86.3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.86.3-1.1.s390x",
"product": {
"name": "gio-branding-upstream-2.86.3-1.1.s390x",
"product_id": "gio-branding-upstream-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-2.86.3-1.1.s390x",
"product": {
"name": "glib2-devel-2.86.3-1.1.s390x",
"product_id": "glib2-devel-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.86.3-1.1.s390x",
"product": {
"name": "glib2-devel-32bit-2.86.3-1.1.s390x",
"product_id": "glib2-devel-32bit-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.86.3-1.1.s390x",
"product": {
"name": "glib2-devel-static-2.86.3-1.1.s390x",
"product_id": "glib2-devel-static-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.86.3-1.1.s390x",
"product": {
"name": "glib2-lang-2.86.3-1.1.s390x",
"product_id": "glib2-lang-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.86.3-1.1.s390x",
"product": {
"name": "glib2-tests-devel-2.86.3-1.1.s390x",
"product_id": "glib2-tests-devel-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.86.3-1.1.s390x",
"product": {
"name": "glib2-tools-2.86.3-1.1.s390x",
"product_id": "glib2-tools-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.86.3-1.1.s390x",
"product": {
"name": "glib2-tools-32bit-2.86.3-1.1.s390x",
"product_id": "glib2-tools-32bit-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.86.3-1.1.s390x",
"product": {
"name": "libgio-2_0-0-2.86.3-1.1.s390x",
"product_id": "libgio-2_0-0-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.86.3-1.1.s390x",
"product": {
"name": "libgio-2_0-0-32bit-2.86.3-1.1.s390x",
"product_id": "libgio-2_0-0-32bit-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.86.3-1.1.s390x",
"product": {
"name": "libgirepository-2_0-0-2.86.3-1.1.s390x",
"product_id": "libgirepository-2_0-0-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.86.3-1.1.s390x",
"product": {
"name": "libglib-2_0-0-2.86.3-1.1.s390x",
"product_id": "libglib-2_0-0-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.86.3-1.1.s390x",
"product": {
"name": "libglib-2_0-0-32bit-2.86.3-1.1.s390x",
"product_id": "libglib-2_0-0-32bit-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.86.3-1.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.86.3-1.1.s390x",
"product_id": "libgmodule-2_0-0-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.s390x",
"product": {
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.s390x",
"product_id": "libgmodule-2_0-0-32bit-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.86.3-1.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.86.3-1.1.s390x",
"product_id": "libgobject-2_0-0-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.s390x",
"product": {
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.s390x",
"product_id": "libgobject-2_0-0-32bit-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.86.3-1.1.s390x",
"product": {
"name": "libgthread-2_0-0-2.86.3-1.1.s390x",
"product_id": "libgthread-2_0-0-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.s390x",
"product": {
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.s390x",
"product_id": "libgthread-2_0-0-32bit-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.s390x",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.s390x",
"product_id": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.s390x",
"product": {
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.s390x",
"product_id": "typelib-1_0-GLib-2_0-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.s390x",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.s390x",
"product_id": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.s390x",
"product": {
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.s390x",
"product_id": "typelib-1_0-GModule-2_0-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.s390x",
"product": {
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.s390x",
"product_id": "typelib-1_0-GObject-2_0-2.86.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.s390x",
"product": {
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.s390x",
"product_id": "typelib-1_0-Gio-2_0-2.86.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.86.3-1.1.x86_64",
"product": {
"name": "gio-branding-upstream-2.86.3-1.1.x86_64",
"product_id": "gio-branding-upstream-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-2.86.3-1.1.x86_64",
"product": {
"name": "glib2-devel-2.86.3-1.1.x86_64",
"product_id": "glib2-devel-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.86.3-1.1.x86_64",
"product": {
"name": "glib2-devel-32bit-2.86.3-1.1.x86_64",
"product_id": "glib2-devel-32bit-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.86.3-1.1.x86_64",
"product": {
"name": "glib2-devel-static-2.86.3-1.1.x86_64",
"product_id": "glib2-devel-static-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.86.3-1.1.x86_64",
"product": {
"name": "glib2-lang-2.86.3-1.1.x86_64",
"product_id": "glib2-lang-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.86.3-1.1.x86_64",
"product": {
"name": "glib2-tests-devel-2.86.3-1.1.x86_64",
"product_id": "glib2-tests-devel-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.86.3-1.1.x86_64",
"product": {
"name": "glib2-tools-2.86.3-1.1.x86_64",
"product_id": "glib2-tools-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.86.3-1.1.x86_64",
"product": {
"name": "glib2-tools-32bit-2.86.3-1.1.x86_64",
"product_id": "glib2-tools-32bit-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.86.3-1.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.86.3-1.1.x86_64",
"product_id": "libgio-2_0-0-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.86.3-1.1.x86_64",
"product": {
"name": "libgio-2_0-0-32bit-2.86.3-1.1.x86_64",
"product_id": "libgio-2_0-0-32bit-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.86.3-1.1.x86_64",
"product": {
"name": "libgirepository-2_0-0-2.86.3-1.1.x86_64",
"product_id": "libgirepository-2_0-0-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.86.3-1.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.86.3-1.1.x86_64",
"product_id": "libglib-2_0-0-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.86.3-1.1.x86_64",
"product": {
"name": "libglib-2_0-0-32bit-2.86.3-1.1.x86_64",
"product_id": "libglib-2_0-0-32bit-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.86.3-1.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.86.3-1.1.x86_64",
"product_id": "libgmodule-2_0-0-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.x86_64",
"product_id": "libgmodule-2_0-0-32bit-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.86.3-1.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.86.3-1.1.x86_64",
"product_id": "libgobject-2_0-0-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.x86_64",
"product": {
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.x86_64",
"product_id": "libgobject-2_0-0-32bit-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.86.3-1.1.x86_64",
"product": {
"name": "libgthread-2_0-0-2.86.3-1.1.x86_64",
"product_id": "libgthread-2_0-0-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.x86_64",
"product": {
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.x86_64",
"product_id": "libgthread-2_0-0-32bit-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.x86_64",
"product_id": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.x86_64",
"product_id": "typelib-1_0-GLib-2_0-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.x86_64",
"product_id": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.x86_64",
"product_id": "typelib-1_0-GModule-2_0-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.x86_64",
"product_id": "typelib-1_0-GObject-2_0-2.86.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.x86_64",
"product_id": "typelib-1_0-Gio-2_0-2.86.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-upstream-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.aarch64"
},
"product_reference": "gio-branding-upstream-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-upstream-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.ppc64le"
},
"product_reference": "gio-branding-upstream-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-upstream-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.s390x"
},
"product_reference": "gio-branding-upstream-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-upstream-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.x86_64"
},
"product_reference": "gio-branding-upstream-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.aarch64"
},
"product_reference": "glib2-devel-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.ppc64le"
},
"product_reference": "glib2-devel-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.s390x"
},
"product_reference": "glib2-devel-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.x86_64"
},
"product_reference": "glib2-devel-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-32bit-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.aarch64"
},
"product_reference": "glib2-devel-32bit-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-32bit-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.ppc64le"
},
"product_reference": "glib2-devel-32bit-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-32bit-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.s390x"
},
"product_reference": "glib2-devel-32bit-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-32bit-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.x86_64"
},
"product_reference": "glib2-devel-32bit-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.aarch64"
},
"product_reference": "glib2-devel-static-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.ppc64le"
},
"product_reference": "glib2-devel-static-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.s390x"
},
"product_reference": "glib2-devel-static-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.x86_64"
},
"product_reference": "glib2-devel-static-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.aarch64"
},
"product_reference": "glib2-lang-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.ppc64le"
},
"product_reference": "glib2-lang-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.s390x"
},
"product_reference": "glib2-lang-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.x86_64"
},
"product_reference": "glib2-lang-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.aarch64"
},
"product_reference": "glib2-tests-devel-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.ppc64le"
},
"product_reference": "glib2-tests-devel-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.s390x"
},
"product_reference": "glib2-tests-devel-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.x86_64"
},
"product_reference": "glib2-tests-devel-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.aarch64"
},
"product_reference": "glib2-tools-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.ppc64le"
},
"product_reference": "glib2-tools-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.s390x"
},
"product_reference": "glib2-tools-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.x86_64"
},
"product_reference": "glib2-tools-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-32bit-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.aarch64"
},
"product_reference": "glib2-tools-32bit-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-32bit-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.ppc64le"
},
"product_reference": "glib2-tools-32bit-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-32bit-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.s390x"
},
"product_reference": "glib2-tools-32bit-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-32bit-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.x86_64"
},
"product_reference": "glib2-tools-32bit-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.s390x"
},
"product_reference": "libgio-2_0-0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.aarch64"
},
"product_reference": "libgio-2_0-0-32bit-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.ppc64le"
},
"product_reference": "libgio-2_0-0-32bit-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.s390x"
},
"product_reference": "libgio-2_0-0-32bit-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.aarch64"
},
"product_reference": "libgirepository-2_0-0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.ppc64le"
},
"product_reference": "libgirepository-2_0-0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.s390x"
},
"product_reference": "libgirepository-2_0-0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.x86_64"
},
"product_reference": "libgirepository-2_0-0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.s390x"
},
"product_reference": "libglib-2_0-0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.aarch64"
},
"product_reference": "libglib-2_0-0-32bit-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.ppc64le"
},
"product_reference": "libglib-2_0-0-32bit-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.s390x"
},
"product_reference": "libglib-2_0-0-32bit-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-32bit-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.s390x"
},
"product_reference": "libgmodule-2_0-0-32bit-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.aarch64"
},
"product_reference": "libgobject-2_0-0-32bit-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-32bit-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.s390x"
},
"product_reference": "libgobject-2_0-0-32bit-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.aarch64"
},
"product_reference": "libgthread-2_0-0-32bit-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-32bit-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.s390x"
},
"product_reference": "libgthread-2_0-0-32bit-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.x86_64"
},
"product_reference": "libgthread-2_0-0-32bit-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.s390x"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-GLib-2_0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.s390x"
},
"product_reference": "typelib-1_0-GLib-2_0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.s390x"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-GModule-2_0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.s390x"
},
"product_reference": "typelib-1_0-GModule-2_0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-GObject-2_0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.s390x"
},
"product_reference": "typelib-1_0-GObject-2_0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.86.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-Gio-2_0-2.86.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.s390x"
},
"product_reference": "typelib-1_0-Gio-2_0-2.86.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.86.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.86.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13601"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13601",
"url": "https://www.suse.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "SUSE Bug 1254297 for CVE-2025-13601",
"url": "https://bugzilla.suse.com/1254297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:gio-branding-upstream-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-static-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-lang-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tests-devel-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.86.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.86.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-10T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-13601"
}
]
}
OPENSUSE-SU-2026:20018-1
Vulnerability from csaf_opensuse - Published: 2026-01-12 11:52 - Updated: 2026-01-12 11:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glib2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glib2 fixes the following issues:\n\nUpdate to version 2.84.4.\n\nSecurity issues fixed:\n\n- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote\n filesystem attribute values can lead to denial-of-service (bsc#1254878).\n- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when\n processing attacker-influenced data may lead to crash or code execution (bsc#1254662).\n- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a\n large number of unacceptable characters may lead to crash or code execution (bsc#1254297).\n- CVE-2025-7039: integer overflow when creating temporary files may lead to an out-of-bounds memory access that can be\n used for path traversal or exposure of sensitive content in a temporary file (bsc#1249055).\n\nOther issues fixed and changes:\n\n- Fix GFile leak in `g_local_file_set_display_name` during error handling.\n- Fix incorrect output parameter handling in closure helper of `g_settings_bind_with_mapping_closures`.\n- `gfileutils`: fix computation of temporary file name.\n- Fix GFile leak in `g_local_file_set_display_name()`.\n- `gthreadpool`: catch `pool_spawner` creation failure.\n- `gio/filenamecompleter`: fix leaks.\n- `gfilenamecompleter`: fix `g_object_unref()` of undefined value.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-132",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20018-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1249055",
"url": "https://bugzilla.suse.com/1249055"
},
{
"category": "self",
"summary": "SUSE Bug 1254297",
"url": "https://bugzilla.suse.com/1254297"
},
{
"category": "self",
"summary": "SUSE Bug 1254662",
"url": "https://bugzilla.suse.com/1254662"
},
{
"category": "self",
"summary": "SUSE Bug 1254878",
"url": "https://bugzilla.suse.com/1254878"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13601 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14087 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14512 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-7039 page",
"url": "https://www.suse.com/security/cve/CVE-2025-7039/"
}
],
"title": "Security update for glib2",
"tracking": {
"current_release_date": "2026-01-12T11:52:23Z",
"generator": {
"date": "2026-01-12T11:52:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20018-1",
"initial_release_date": "2026-01-12T11:52:23Z",
"revision_history": [
{
"date": "2026-01-12T11:52:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.84.4-160000.1.1.aarch64",
"product": {
"name": "glib2-devel-2.84.4-160000.1.1.aarch64",
"product_id": "glib2-devel-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.4-160000.1.1.aarch64",
"product": {
"name": "glib2-devel-static-2.84.4-160000.1.1.aarch64",
"product_id": "glib2-devel-static-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.84.4-160000.1.1.aarch64",
"product": {
"name": "glib2-doc-2.84.4-160000.1.1.aarch64",
"product_id": "glib2-doc-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"product": {
"name": "glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"product_id": "glib2-tests-devel-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.aarch64",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.aarch64",
"product_id": "glib2-tools-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"product_id": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.84.4-160000.1.1.noarch",
"product": {
"name": "gio-branding-upstream-2.84.4-160000.1.1.noarch",
"product_id": "gio-branding-upstream-2.84.4-160000.1.1.noarch"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.84.4-160000.1.1.noarch",
"product": {
"name": "glib2-lang-2.84.4-160000.1.1.noarch",
"product_id": "glib2-lang-2.84.4-160000.1.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "glib2-devel-2.84.4-160000.1.1.ppc64le",
"product_id": "glib2-devel-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"product_id": "glib2-devel-static-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "glib2-doc-2.84.4-160000.1.1.ppc64le",
"product_id": "glib2-doc-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"product_id": "glib2-tests-devel-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.ppc64le",
"product_id": "glib2-tools-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"product_id": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.84.4-160000.1.1.s390x",
"product": {
"name": "glib2-devel-2.84.4-160000.1.1.s390x",
"product_id": "glib2-devel-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.4-160000.1.1.s390x",
"product": {
"name": "glib2-devel-static-2.84.4-160000.1.1.s390x",
"product_id": "glib2-devel-static-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.84.4-160000.1.1.s390x",
"product": {
"name": "glib2-doc-2.84.4-160000.1.1.s390x",
"product_id": "glib2-doc-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.84.4-160000.1.1.s390x",
"product": {
"name": "glib2-tests-devel-2.84.4-160000.1.1.s390x",
"product_id": "glib2-tests-devel-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.s390x",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.s390x",
"product_id": "glib2-tools-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"product": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"product_id": "libgthread-2_0-0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.84.4-160000.1.1.x86_64",
"product": {
"name": "glib2-devel-2.84.4-160000.1.1.x86_64",
"product_id": "glib2-devel-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.4-160000.1.1.x86_64",
"product": {
"name": "glib2-devel-static-2.84.4-160000.1.1.x86_64",
"product_id": "glib2-devel-static-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.84.4-160000.1.1.x86_64",
"product": {
"name": "glib2-doc-2.84.4-160000.1.1.x86_64",
"product_id": "glib2-doc-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"product": {
"name": "glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"product_id": "glib2-tests-devel-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.4-160000.1.1.x86_64",
"product": {
"name": "glib2-tools-2.84.4-160000.1.1.x86_64",
"product_id": "glib2-tools-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgio-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libglib-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"product_id": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"product_id": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-upstream-2.84.4-160000.1.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch"
},
"product_reference": "gio-branding-upstream-2.84.4-160000.1.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-devel-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-devel-static-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-doc-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.84.4-160000.1.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch"
},
"product_reference": "glib2-lang-2.84.4-160000.1.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-tests-devel-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64"
},
"product_reference": "glib2-tools-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13601"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13601",
"url": "https://www.suse.com/security/cve/CVE-2025-13601"
},
{
"category": "external",
"summary": "SUSE Bug 1254297 for CVE-2025-13601",
"url": "https://bugzilla.suse.com/1254297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:52:23Z",
"details": "important"
}
],
"title": "CVE-2025-13601"
},
{
"cve": "CVE-2025-14087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14087"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14087",
"url": "https://www.suse.com/security/cve/CVE-2025-14087"
},
{
"category": "external",
"summary": "SUSE Bug 1254662 for CVE-2025-14087",
"url": "https://bugzilla.suse.com/1254662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:52:23Z",
"details": "important"
}
],
"title": "CVE-2025-14087"
},
{
"cve": "CVE-2025-14512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14512"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib\u0027s GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14512",
"url": "https://www.suse.com/security/cve/CVE-2025-14512"
},
{
"category": "external",
"summary": "SUSE Bug 1254878 for CVE-2025-14512",
"url": "https://bugzilla.suse.com/1254878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:52:23Z",
"details": "moderate"
}
],
"title": "CVE-2025-14512"
},
{
"cve": "CVE-2025-7039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-7039"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-7039",
"url": "https://www.suse.com/security/cve/CVE-2025-7039"
},
{
"category": "external",
"summary": "SUSE Bug 1249055 for CVE-2025-7039",
"url": "https://bugzilla.suse.com/1249055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:gio-branding-upstream-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-devel-static-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-doc-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-lang-2.84.4-160000.1.1.noarch",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tests-devel-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:glib2-tools-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgio-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgirepository-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libglib-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgmodule-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgobject-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:libgthread-2_0-0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLib-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GModule-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-GObject-2_0-2.84.4-160000.1.1.x86_64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.aarch64",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.ppc64le",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.s390x",
"openSUSE Leap 16.0:typelib-1_0-Gio-2_0-2.84.4-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:52:23Z",
"details": "moderate"
}
],
"title": "CVE-2025-7039"
}
]
}
MSRC_CVE-2025-13601
Vulnerability from csaf_microsoft - Published: 2025-11-02 00:00 - Updated: 2025-12-02 01:35Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-13601 Glib: integer overflow in in g_escape_uri_string() - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-13601.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Glib: integer overflow in in g_escape_uri_string()",
"tracking": {
"current_release_date": "2025-12-02T01:35:13.000Z",
"generator": {
"date": "2025-12-03T22:59:15.056Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-13601",
"initial_release_date": "2025-11-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-11-29T01:02:52.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-12-02T01:35:13.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 glib 2.71.0-7",
"product": {
"name": "\u003ccbl2 glib 2.71.0-7",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 glib 2.71.0-7",
"product": {
"name": "cbl2 glib 2.71.0-7",
"product_id": "20365"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 glib 2.78.6-4",
"product": {
"name": "\u003cazl3 glib 2.78.6-4",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 glib 2.78.6-4",
"product": {
"name": "azl3 glib 2.78.6-4",
"product_id": "20554"
}
}
],
"category": "product_name",
"name": "glib"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 glib 2.71.0-7 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 glib 2.71.0-7 as a component of CBL Mariner 2.0",
"product_id": "20365-17086"
},
"product_reference": "20365",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 glib 2.78.6-4 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 glib 2.78.6-4 as a component of Azure Linux 3.0",
"product_id": "20554-17084"
},
"product_reference": "20554",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20365-17086",
"20554-17084"
],
"known_affected": [
"17086-2",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-13601 Glib: integer overflow in in g_escape_uri_string() - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-13601.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-29T01:02:52.000Z",
"details": "2.71.0-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-11-29T01:02:52.000Z",
"details": "2.78.6-5:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.7,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"17086-2",
"17084-1"
]
}
],
"title": "Glib: integer overflow in in g_escape_uri_string()"
}
]
}
FKIE_CVE-2025-13601
Vulnerability from fkie_nvd - Published: 2025-11-26 15:15 - Updated: 2026-02-19 07:17| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:0936 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:0975 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:0991 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1323 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1324 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1326 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1327 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1465 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1608 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1624 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1625 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1626 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1627 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1652 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:1736 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:2064 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:2072 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:2485 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:2563 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:2633 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:2659 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:2671 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2025-13601 | Vendor Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2416741 | Issue Tracking, Vendor Advisory | |
| secalert@redhat.com | https://gitlab.gnome.org/GNOME/glib/-/issues/3827 | Exploit, Issue Tracking | |
| secalert@redhat.com | https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| redhat | codeready_linux_builder | 9.0 | |
| redhat | codeready_linux_builder_for_ibm_z_systems | 9.0_s390x | |
| redhat | codeready_linux_builder_for_power_little_endian | 9.0_ppc64le | |
| redhat | codeready_linux_builder_for_x86_64 | 9.0 | |
| redhat | enterprise_linux_for_arm_64 | 9.0 | |
| redhat | enterprise_linux_for_ibm_z_systems | 9.0_s390x | |
| redhat | enterprise_linux_for_power_little_endian | 9.0_ppc64le | |
| redhat | enterprise_linux_for_x86_64 | 9.0 | |
| redhat | codeready_linux_builder_for_arm64 | 10.0 | |
| redhat | codeready_linux_builder_for_ibm_z_systems | 10.0_s390x | |
| redhat | codeready_linux_builder_for_power_little_endian | 10.0_ppc64le | |
| redhat | codeready_linux_builder_for_x86_64 | 10.0 | |
| redhat | enterprise_linux_for_arm_64 | 10.0 | |
| redhat | enterprise_linux_for_ibm_z_systems | 10.0_s390x | |
| redhat | enterprise_linux_for_power_little_endian | 10.0_ppc64le | |
| redhat | enterprise_linux_for_x86_64 | 10.0 | |
| redhat | codeready_linux_builder_for_arm64 | 8.0 | |
| redhat | codeready_linux_builder_for_ibm_z_systems | 8.0_s390x | |
| redhat | codeready_linux_builder_for_power_little_endian | 8.0_ppc64le | |
| redhat | codeready_linux_builder_for_x86_64 | 8.0 | |
| redhat | enterprise_linux_for_arm_64 | 8.0 | |
| redhat | enterprise_linux_for_ibm_z_systems | 8.0_s390x | |
| redhat | enterprise_linux_for_power_little_endian | 8.0_ppc64le | |
| redhat | enterprise_linux_for_x86_64 | 8.0 | |
| redhat | enterprise_linux_for_arm_64 | 9.2 | |
| redhat | enterprise_linux_for_ibm_z_systems | 9.2_s390x | |
| redhat | enterprise_linux_for_power_little_endian | 9.2_ppc64le | |
| redhat | enterprise_linux_for_x86_64 | 9.2 | |
| redhat | enterprise_linux_server_aus | 9.2 | |
| redhat | codeready_linux_builder_for_arm64_eus | 9.4 | |
| redhat | codeready_linux_builder_for_ibm_z_systems | 9.4_s390x | |
| redhat | codeready_linux_builder_for_power_little_endian | 9.4_ppc64le | |
| redhat | codeready_linux_builder_for_x86_64 | 9.4 | |
| redhat | enterprise_linux_for_arm_64 | 9.4 | |
| redhat | enterprise_linux_for_ibm_z_systems | 9.4_s390x | |
| redhat | enterprise_linux_for_power_little_endian | 9.4_ppc64le | |
| redhat | enterprise_linux_for_x86_64 | 9.4 | |
| redhat | enterprise_linux_for_x86_64_eus | 9.4 | |
| redhat | enterprise_linux_server_aus | 9.4 | |
| redhat | enterprise_linux_server_for_power_little_endian | 9.4_ppc64le | |
| redhat | enterprise_linux_server_for_power_little_endian_eus | 9.4_ppc64le | |
| redhat | codeready_linux_builder_for_arm64_eus | 10.0 | |
| redhat | codeready_linux_builder_for_ibm_z_systems_eus | 10.0_s390x | |
| redhat | codeready_linux_builder_for_power_little_endian_eus | 10.0_ppc64le | |
| redhat | codeready_linux_builder_for_x86_64_eus | 10.0 | |
| redhat | enterprise_linux_for_arm_64_eus | 10.0 | |
| redhat | enterprise_linux_for_ibm_z_systems_eus | 10.0_s390x | |
| redhat | enterprise_linux_for_power_little_endian_eus | 10.0_ppc64le | |
| redhat | enterprise_linux_for_x86_64_eus | 10.0 | |
| redhat | enterprise_linux_server_for_power_little_endian | 10.0_ppc64le | |
| redhat | codeready_linux_builder_for_arm64 | 9.6 | |
| redhat | codeready_linux_builder_for_ibm_z_systems | 9.6_s390x | |
| redhat | codeready_linux_builder_for_power_little_endian | 9.6_ppc64le | |
| redhat | codeready_linux_builder_for_x86_64 | 9.6 | |
| redhat | enterprise_linux_for_arm_64 | 9.6 | |
| redhat | enterprise_linux_for_ibm_z_systems | 9.6_s390x | |
| redhat | enterprise_linux_for_power_little_endian | 9.6_ppc64le | |
| redhat | enterprise_linux_for_power_little_endian_eus | 9.6_ppc64le | |
| redhat | enterprise_linux_for_x86_64 | 9.6 | |
| redhat | enterprise_linux_for_x86_64_eus | 9.6 | |
| redhat | enterprise_linux_server_aus | 9.6 | |
| redhat | enterprise_linux_server_for_power_little_endian | 9.6_ppc64le | |
| redhat | enterprise_linux_for_x86_64 | 8.6 | |
| redhat | enterprise_linux_for_x86_64_eus | 8.6 | |
| redhat | enterprise_linux_server_aus | 8.6 | |
| redhat | enterprise_linux_server_for_power_little_endian | 8.6_ppc64le | |
| redhat | enterprise_linux_server_tus | 8.6 | |
| redhat | enterprise_linux_for_x86_64 | 8.8 | |
| redhat | enterprise_linux_for_x86_64_eus | 8.8 | |
| redhat | enterprise_linux_server_for_power_little_endian | 8.8_ppc64le | |
| redhat | enterprise_linux_server_tus | 8.8 | |
| redhat | enterprise_linux_for_x86_64_eus | 8.4 | |
| redhat | enterprise_linux_server_aus | 8.4 | |
| redhat | enterprise_linux_server_aus | 8.2 | |
| redhat | ceph_storage | 8.0 | |
| redhat | discovery | 2.0 | |
| gnome | glib | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder:9.0:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "7905C85D-4663-4485-99C1-202F4A7D6EBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "CA3C5EAE-267F-410F-8AFA-8F5B68A9E617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "7B3D7389-35C1-48C4-A9EC-2564842723C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D70C7263-C24B-4090-9E44-0E0CFD2294A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "1810D5FB-1AB2-4861-A671-CA548C2FFDC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "FB056B47-1F45-4CE4-81F6-872F66C24C29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "E07C1C58-0E5F-4B56-9B8D-5DE67DB00F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE296A4-202C-41AF-92AB-AC0672EAFA90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:10.0:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "EF8B4882-78F7-4DC5-BF80-983143DA0155",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:10.0_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "FA2DB6C0-E18E-492A-B517-4020A7FB049A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:10.0_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "6FAC9D08-6D5C-443D-99C7-6FD20AF83523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D791EEA5-68D1-41E0-A53D-8EBB9C6CF873",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:10.0:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "18873769-C951-42F2-A98B-761652148F59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:10.0_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "8492E227-C09E-4F51-8EAF-0F7BCCD41A16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:10.0_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "1FABD546-0E45-4A65-A2E5-50EC62B852E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5C4D6060-0C13-4976-A366-C4655367AA78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:8.0:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "C70933CB-B915-4792-902B-CC858829D208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "55CF7208-4D36-4C35-92BC-F6EA2C8DEDE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "F791F846-7762-40E0-9056-032FD10F2046",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F967F2F2-9B99-46D3-A092-F7AE41F5D5B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "73F3D9DA-CEFB-471B-85A2-8652D37D7F30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "32AF225E-94C0-4D07-900C-DD868C05F554",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "23D471AC-7DCA-4425-AD91-E5D928753A8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97104CED-E93B-49CE-81F8-810AF2A8A392",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "4ACBFE13-EF28-48EC-ACDC-AC3159C2AB67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "2E068ABB-31C2-416E-974A-95E07A2BAB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.2_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "ED521457-498F-4E43-B714-9A3F2C3CD09A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "66DA6342-8316-4961-9C2A-01D6DC51446A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "80A262F1-B05B-43BA-ABB2-0FDE68C16A8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "1E1C5656-6A78-4DCD-A369-76DFD61618E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.4_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "D0002CB3-8004-4927-A92C-E7C1F83322E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4B9984-698D-4A60-AB6C-3B4CCDD9697F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "8B79BA89-CB0F-4153-9692-AA9BEA765076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "069180B4-BA50-4AD0-8BA9-83F8005E58BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.4_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "53EBD3B7-D31D-46A5-BDFA-178FDF79C776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A75E10C3-AA3F-43CD-AB14-16754619B48D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E5EF3CEF-62CF-4860-8301-4154D2407236",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D345D3-108A-4551-A112-5EE51991411A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:9.4_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "212A3822-46F7-4144-B875-349452A93F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "24105826-EBD2-4029-978B-B7176343C09C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:10.0:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "C1FC4688-EE61-40B0-B36C-5B40A54FEB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:10.0_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "8E6DF379-2929-4F2B-A3F7-D32EF0A634B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:10.0_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "79B04B55-C375-4A04-88B6-307B5121538D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64_eus:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0AEA15D8-8BE8-4D4A-97C3-5F237CAB18DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:10.0:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "FC6F6213-7AE9-4454-B3CB-8AD6999C733E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:10.0_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8456B7-F13F-4E74-B610-F1301B738A6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:10.0_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "189D490B-E674-4957-BD84-B0615A06FBF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9ECE154D-05A8-43F6-AAEB-9EF460B3A721",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:10.0_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "50CBF587-5E49-41B8-803E-3020142FF1A6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.6:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "9B58B337-8F7B-4812-91BF-F26044EDF603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.6_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A892AD-1CB2-42AC-B163-DB34613D8AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.6_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "AC8564CF-FCAC-48AE-AE11-4AB7068197BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64:9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "241FE2FA-8B22-4878-B30A-81ABEFD29C2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.6:*:*:*:*:*:aarch64:*",
"matchCriteriaId": "8E3BC071-331C-40FF-911C-699B83C9E874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.6_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "D284FF58-5ED8-4F0F-80BA-4E677256994A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.6_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F38D24-E400-42E8-BBD3-CA44CE414D54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.6_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "0516993E-CBD5-44F1-8684-7172C9ABFD0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF644CC-8CDF-4C0C-B40C-80106A479B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7254B894-CFCB-4599-8228-A3DD7C996489",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0FDD919E-B7FE-4EC5-8D6B-EC9A4723D6E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:9.6_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA517DC-CC2E-4F71-A753-3611747C2B03",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C04BCAC6-85B4-45C3-9591-B8A3B95E0682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4865A7-DD37-45C0-839E-AA07F47DD44F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "76C24D94-834A-4E9D-8F73-624AFA99AAA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:8.6_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "B5ACFD7D-558D-4E72-824B-3C890BE76086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1272DF03-7674-4BD4-8E64-94004B195448",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64:8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7692F48F-F14D-452A-B145-761A28A65063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "439D3548-E194-4A99-8E39-EC1A7B1C0BAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:8.8_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F10F1F-5DA7-49FF-A8A7-524251699323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F1CA946D-1665-4874-9D41-C7D963DD1F56",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A50F79DB-13DE-4725-962D-9487256F03EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E28F226A-CBC7-4A32-BE58-398FA5B42481",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6897676D-53F9-45B3-B27F-7FF9A4C58D33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ceph_storage:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52AE9D9D-5D74-4AB8-8FF9-5CEA2A1A97B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:discovery:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46C0E53D-07D5-48BF-8749-637DACF255A5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*",
"matchCriteriaId": "890566A0-619C-42E2-BD1D-9EFAC63E68F4",
"versionEndExcluding": "2.86.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string."
}
],
"id": "CVE-2025-13601",
"lastModified": "2026-02-19T07:17:31.273",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 5.2,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2025-11-26T15:15:51.723",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:0936"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:0975"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:0991"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1323"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1324"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1326"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1327"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1465"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1608"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1624"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1625"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1626"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1627"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2064"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2072"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2563"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2633"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2659"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2671"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-13601"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416741"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3827"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
WID-SEC-W-2026-0187
Vulnerability from csaf_certbund - Published: 2026-01-21 23:00 - Updated: 2026-02-15 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in der glib Bibliothek von Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und weitere nicht spezifizierte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0187 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0187.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0187 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0187"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0936"
},
{
"category": "external",
"summary": "RedHat Customer Portal vom 2026-01-21",
"url": "https://access.redhat.com/security/cve/cve-2025-13601"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0975 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0975"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0936 vom 2026-01-22",
"url": "https://errata.build.resf.org/RLSA-2026:0936"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0936 vom 2026-01-22",
"url": "https://linux.oracle.com/errata/ELSA-2026-0936.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0991 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0991"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0975 vom 2026-01-22",
"url": "https://linux.oracle.com/errata/ELSA-2026-0975.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0991 vom 2026-01-23",
"url": "https://linux.oracle.com/errata/ELSA-2026-0991.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0991 vom 2026-01-24",
"url": "https://errata.build.resf.org/RLSA-2026:0991"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0975 vom 2026-01-24",
"url": "https://errata.build.resf.org/RLSA-2026:0975"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1326 vom 2026-01-27",
"url": "https://access.redhat.com/errata/RHSA-2026:1326"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1327 vom 2026-01-27",
"url": "https://access.redhat.com/errata/RHSA-2026:1327"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1324 vom 2026-01-27",
"url": "https://access.redhat.com/errata/RHSA-2026:1324"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1323 vom 2026-01-27",
"url": "https://access.redhat.com/errata/RHSA-2026:1323"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1465 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1465"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1608 vom 2026-01-30",
"url": "https://access.redhat.com/errata/RHSA-2026:1608"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1627 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1627"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1626 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1626"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1625 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1625"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1624 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1624"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1652 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1736 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1736"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2072 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2072"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7942-2 vom 2026-02-10",
"url": "https://ubuntu.com/security/notices/USN-7942-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2485 vom 2026-02-10",
"url": "https://access.redhat.com/errata/RHSA-2026:2485"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1608 vom 2026-02-11",
"url": "https://linux.oracle.com/errata/ELSA-2026-1608.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2064 vom 2026-02-13",
"url": "https://access.redhat.com/errata/RHSA-2026:2064"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (glib): Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2026-02-15T23:00:00.000+00:00",
"generator": {
"date": "2026-02-16T11:20:53.720+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0187",
"initial_release_date": "2026-01-21T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T035609",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13601",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035609",
"T004914",
"T032255"
]
},
"release_date": "2026-01-21T23:00:00.000+00:00",
"title": "CVE-2025-13601"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.