摘要:
glib2 security update
安全等级: Low
公告ID: KylinSec-SA-2025-2713
发布日期: 2025年9月11日
关联CVE: CVE-2025-6052
GLib is a bundle of three (formerly five) low-level system libraries written in C and developed mainly by GNOME. GLib's code was separated from GTK, so it can be used by software other than GNOME and has been developed in parallel ever since.
Security Fix(es):
A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.(CVE-2025-6052)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2025-6052 | V6 | glib2 | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
glib2-help | noarch | 2.78.3-10.ks6 |
glib2 | x86_64 | 2.78.3-10.ks6 |
glib2-devel | x86_64 | 2.78.3-10.ks6 |
glib2-static | x86_64 | 2.78.3-10.ks6 |
glib2-tests | x86_64 | 2.78.3-10.ks6 |
glib2 | aarch64 | 2.78.3-10.ks6 |
glib2-devel | aarch64 | 2.78.3-10.ks6 |
glib2-static | aarch64 | 2.78.3-10.ks6 |
glib2-tests | aarch64 | 2.78.3-10.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名