{"id":"USN-7942-1","summary":"glib2.0 vulnerabilities","details":"It was discovered that GLib incorrectly handled escaping URI strings. An\nattacker could use this issue to cause GLib to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. (CVE-2025-13601)\n\nIt was discovered that GLib incorrectly parsed certain GVariants. An\nattacker could use this issue to cause GLib to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. (CVE-2025-14087)\n\nIt was discovered that GLib incorrectly parsed certain long invalid ISO\n8601 timestamps. An attacker could possibly use this issue to cause GLib to\ncrash, resulting in a denial of service. This issue only affected Ubuntu\n22.04 LTS and Ubuntu 24.04 LTS. (CVE-2025-3360)\n\nIt was discovered that GLib incorrectly handled GString memory operations.\nAn attacker could use this issue to cause GLib to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. This issue only\naffected Ubuntu 24.04 LTS and Ubuntu 25.04. (CVE-2025-6052)\n\nIt was discovered that GLib incorrectly handled creating temporary files.\nAn attacker could possibly use this issue to access unauthorized data. This\nissue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 25.04.\n(CVE-2025-7039)","modified":"2026-04-22T11:04:08.476133Z","published":"2026-01-06T15:17:45Z","related":["UBUNTU-CVE-2025-13601","UBUNTU-CVE-2025-14087","UBUNTU-CVE-2025-3360","UBUNTU-CVE-2025-6052","UBUNTU-CVE-2025-7039"],"upstream":["CVE-2025-13601","CVE-2025-14087","CVE-2025-3360","CVE-2025-6052","CVE-2025-7039","UBUNTU-CVE-2025-13601","UBUNTU-CVE-2025-14087","UBUNTU-CVE-2025-3360","UBUNTU-CVE-2025-6052","UBUNTU-CVE-2025-7039"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7942-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-3360"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-6052"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-7039"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-13601"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-14087"}],"affected":[{"package":{"name":"glib2.0","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/glib2.0@2.72.4-0ubuntu2.7?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.72.4-0ubuntu2.7"}]}],"versions":["2.68.4-1ubuntu1","2.70.1-1","2.70.2-1","2.71.0-2","2.71.1-1","2.71.2-1","2.71.3-1","2.72.0-1","2.72.1-1","2.72.4-0ubuntu1","2.72.4-0ubuntu2","2.72.4-0ubuntu2.2","2.72.4-0ubuntu2.3","2.72.4-0ubuntu2.4","2.72.4-0ubuntu2.5","2.72.4-0ubuntu2.6"],"ecosystem_specific":{"binaries":[{"binary_name":"libglib2.0-0","binary_version":"2.72.4-0ubuntu2.7"},{"binary_name":"libglib2.0-bin","binary_version":"2.72.4-0ubuntu2.7"},{"binary_name":"libglib2.0-data","binary_version":"2.72.4-0ubuntu2.7"},{"binary_name":"libglib2.0-dev-bin","binary_version":"2.72.4-0ubuntu2.7"},{"binary_name":"libglib2.0-tests","binary_version":"2.72.4-0ubuntu2.7"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7942-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2025-3360"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2025-7039"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-13601"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-14087"}]}}},{"package":{"name":"glib2.0","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/glib2.0@2.80.0-6ubuntu3.6?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.80.0-6ubuntu3.6"}]}],"versions":["2.78.0-2","2.78.1-4","2.78.3-1","2.78.3-2","2.79.1-1","2.79.2-1~ubuntu1","2.79.3-3ubuntu5","2.80.0-6ubuntu1","2.80.0-6ubuntu3","2.80.0-6ubuntu3.1","2.80.0-6ubuntu3.2","2.80.0-6ubuntu3.4","2.80.0-6ubuntu3.5"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-girepository-3.0","binary_version":"2.80.0-6ubuntu3.6"},{"binary_name":"gir1.2-glib-2.0","binary_version":"2.80.0-6ubuntu3.6"},{"binary_name":"libgirepository-2.0-0","binary_version":"2.80.0-6ubuntu3.6"},{"binary_name":"libglib2.0-0t64","binary_version":"2.80.0-6ubuntu3.6"},{"binary_name":"libglib2.0-bin","binary_version":"2.80.0-6ubuntu3.6"},{"binary_name":"libglib2.0-data","binary_version":"2.80.0-6ubuntu3.6"},{"binary_name":"libglib2.0-dev-bin","binary_version":"2.80.0-6ubuntu3.6"},{"binary_name":"libglib2.0-tests","binary_version":"2.80.0-6ubuntu3.6"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7942-1.json","cves_map":{"ecosystem":"Ubuntu:24.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2025-3360"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2025-6052"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2025-7039"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-13601"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-14087"}]}}},{"package":{"name":"glib2.0","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/glib2.0@2.86.0-2ubuntu0.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.86.0-2ubuntu0.1"}]}],"versions":["2.84.1-1","2.84.1-2","2.84.2-1","2.84.3-1","2.85.1-2","2.85.2-2","2.85.3-1","2.86.0-2"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-girepository-3.0","binary_version":"2.86.0-2ubuntu0.1"},{"binary_name":"gir1.2-glib-2.0","binary_version":"2.86.0-2ubuntu0.1"},{"binary_name":"girepository-tools","binary_version":"2.86.0-2ubuntu0.1"},{"binary_name":"libgio-2.0-dev-bin","binary_version":"2.86.0-2ubuntu0.1"},{"binary_name":"libgirepository-2.0-0","binary_version":"2.86.0-2ubuntu0.1"},{"binary_name":"libglib2.0-0t64","binary_version":"2.86.0-2ubuntu0.1"},{"binary_name":"libglib2.0-bin","binary_version":"2.86.0-2ubuntu0.1"},{"binary_name":"libglib2.0-data","binary_version":"2.86.0-2ubuntu0.1"},{"binary_name":"libglib2.0-dev-bin","binary_version":"2.86.0-2ubuntu0.1"},{"binary_name":"libglib2.0-tests","binary_version":"2.86.0-2ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7942-1.json","cves_map":{"ecosystem":"Ubuntu:25.10","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-13601"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-14087"}]}}}],"schema_version":"1.7.5"}