[USN-7971-1] GLib vulnerability
noreply+usn-bot at canonical.com
noreply+usn-bot at canonical.com
Wed Jan 21 17:23:58 UTC 2026
==========================================================================
Ubuntu Security Notice USN-7971-1
January 21, 2026
glib2.0 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
GLib could be made to crash or run programs if it received specially
crafted input.
Software Description:
- glib2.0: GLib library of C routines
Details:
It was discovered that GLib incorrectly handled the buffered input stream
API. An attacker could use this issue to cause GLib to crash, resulting in
a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
libglib2.0-0t64 2.86.0-2ubuntu0.2
libglib2.0-bin 2.86.0-2ubuntu0.2
Ubuntu 24.04 LTS
libglib2.0-0t64 2.80.0-6ubuntu3.7
libglib2.0-bin 2.80.0-6ubuntu3.7
Ubuntu 22.04 LTS
libglib2.0-0 2.72.4-0ubuntu2.8
libglib2.0-bin 2.72.4-0ubuntu2.8
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7971-1
CVE-2026-0988
Package Information:
https://launchpad.net/ubuntu/+source/glib2.0/2.86.0-2ubuntu0.2
https://launchpad.net/ubuntu/+source/glib2.0/2.80.0-6ubuntu3.7
https://launchpad.net/ubuntu/+source/glib2.0/2.72.4-0ubuntu2.8
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20260121/a3757dea/attachment.sig>
More information about the ubuntu-security-announce
mailing list