<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE3-SA-2025-0041</id>
    <title>An update for glib2 is now available for HCE 3.0</title>
    <severity>Moderate</severity>
    <release>HCE 3.0</release>
    <issued date="2025-10-09 06:38:14"/>
    <updated date="2025-10-09 06:38:14"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-3360" id="CVE-2025-3360" title="CVE-2025-3360 Base Score: 3.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-7039" id="CVE-2025-7039" title="CVE-2025-7039 Base Score: 3.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-6052" id="CVE-2025-6052" title="CVE-2025-6052 Base Score: 3.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-4373" id="CVE-2025-4373" title="CVE-2025-4373 Base Score: 4.8 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-4056" id="CVE-2025-4056" title="CVE-2025-4056 Base Score: 3.7 Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
    </references>
    <description>Security Fix(es):

A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function. (CVE-2025-3360)

A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations. (CVE-2025-7039)

A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption. (CVE-2025-6052)

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite. (CVE-2025-4373)

A vulnerability was found in GNU GLib up to 2.84.0 on Windows (Software Library). It has been rated as problematic. Affected by this issue is some unknown processing of the component Command Line Handler. Upgrading to version 2.84.1 eliminates this vulnerability. (CVE-2025-4056)
</description>
    <pkglist>
      <collection short="HCE 3.0" package="glib2">
        <name>HCE 3.0</name>
        <package arch="x86_64" name="glib2" version="2.78.3" release="6.r7.hce3">
          <filename>glib2-2.78.3-6.r7.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="glib2-devel" version="2.78.3" release="6.r7.hce3">
          <filename>glib2-devel-2.78.3-6.r7.hce3.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="glib2-help" version="2.78.3" release="6.r7.hce3">
          <filename>glib2-help-2.78.3-6.r7.hce3.noarch.rpm</filename>
        </package>
        <package arch="aarch64" name="glib2" version="2.78.3" release="6.r7.hce3">
          <filename>glib2-2.78.3-6.r7.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="glib2-devel" version="2.78.3" release="6.r7.hce3">
          <filename>glib2-devel-2.78.3-6.r7.hce3.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
