Update

USN-7971-1: GLib vulnerability

USN-7971-1: GLib vulnerability
Publication date : 21 January 2026

Overview: GLib could be made to crash or run programs if it received specially crafted input.

Packages
glib2.0 - GLib library of C routines

Details
It was discovered that GLib incorrectly handled the buffered input stream
API. An attacker could use this issue to cause GLib to crash, resulting in
a denial of service, or possibly execute arbitrary code.

Update instructions
In general, a standard system update will make all the necessary changes.

The problem can be corrected by updating your system to the following package versions:

25.10 questing

  • libglib2.0-0t64 – 2.86.0-2ubuntu0.2
  • libglib2.0-bin – 2.86.0-2ubuntu0.2

24.04 LTS noble

  • libglib2.0-0t64 – 2.80.0-6ubuntu3.7
  • libglib2.0-bin – 2.80.0-6ubuntu3.7

22.04 LTS jammy

  • libglib2.0-0 – 2.72.4-0ubuntu2.8
  • libglib2.0-bin – 2.72.4-0ubuntu2.8
The manufacturer Canonical has not yet set up its devicebase profile. Content such as updates, compatibilities and support may only be maintained with a delay.
Receive Important Update Messages Stay tuned for upcoming Canonical updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad