• 公告ID (KylinSec-SA-2025-2713)

摘要:

glib2 security update

安全等级: Low

公告ID: KylinSec-SA-2025-2713

发布日期: 2025年9月11日

关联CVE: CVE-2025-6052  

  • 详细介绍

1. 漏洞描述

   

GLib is a bundle of three (formerly five) low-level system libraries written in C and developed mainly by GNOME. GLib's code was separated from GTK, so it can be used by software other than GNOME and has been developed in parallel ever since.

Security Fix(es):

A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.(CVE-2025-6052)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2025-6052 V6 glib2 Fixed

3. 影响组件

    glib2

4. 修复版本

   

V6

软件名称 架构 版本号
glib2-help noarch 2.78.3-10.ks6
glib2 x86_64 2.78.3-10.ks6
glib2-devel x86_64 2.78.3-10.ks6
glib2-static x86_64 2.78.3-10.ks6
glib2-tests x86_64 2.78.3-10.ks6
glib2 aarch64 2.78.3-10.ks6
glib2-devel aarch64 2.78.3-10.ks6
glib2-static aarch64 2.78.3-10.ks6
glib2-tests aarch64 2.78.3-10.ks6

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

V6:

x86_64:

     glib2-help   

     glib2   

     glib2-devel   

     glib2-static   

     glib2-tests   

aarch64:

     glib2-help   

     glib2   

     glib2-devel   

     glib2-static   

     glib2-tests   

上一篇:KylinSec-SA-2025-2690 下一篇: