vulnerability
SUSE: CVE-2026-1489: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:N/I:P/A:P) | Jan 31, 2026 | Feb 4, 2026 | Feb 9, 2026 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:P)
Published
Jan 31, 2026
Added
Feb 4, 2026
Modified
Feb 9, 2026
Description
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
Solutions
suse-upgrade-gio-branding-upstreamsuse-upgrade-glib2-develsuse-upgrade-glib2-devel-32bitsuse-upgrade-glib2-devel-staticsuse-upgrade-glib2-docsuse-upgrade-glib2-langsuse-upgrade-glib2-tests-develsuse-upgrade-glib2-toolssuse-upgrade-glib2-tools-32bitsuse-upgrade-libgio-2_0-0suse-upgrade-libgio-2_0-0-32bitsuse-upgrade-libgirepository-2_0-0suse-upgrade-libglib-2_0-0suse-upgrade-libglib-2_0-0-32bitsuse-upgrade-libgmodule-2_0-0suse-upgrade-libgmodule-2_0-0-32bitsuse-upgrade-libgobject-2_0-0suse-upgrade-libgobject-2_0-0-32bitsuse-upgrade-libgthread-2_0-0suse-upgrade-libgthread-2_0-0-32bitsuse-upgrade-typelib-1_0-gio-2_0suse-upgrade-typelib-1_0-girepository-3_0suse-upgrade-typelib-1_0-glib-2_0suse-upgrade-typelib-1_0-glibunix-2_0suse-upgrade-typelib-1_0-gmodule-2_0suse-upgrade-typelib-1_0-gobject-2_0
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.