USN-7942-2

Source
https://ubuntu.com/security/notices/USN-7942-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7942-2.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-7942-2
Upstream
Related
Published
2026-02-10T17:07:40Z
Modified
2026-02-12T07:16:12.832024Z
Summary
glib2.0 vulnerabilities
Details

USN-7942-1 fixed vulnerabilities in GLib. This update provides the corresponding updates for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. CVE-2025-3360 only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.

Original advisory details:

It was discovered that GLib incorrectly handled escaping URI strings. An attacker could use this issue to cause GLib to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-13601)

It was discovered that GLib incorrectly parsed certain GVariants. An attacker could use this issue to cause GLib to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-14087)

It was discovered that GLib incorrectly parsed certain long invalid ISO 8601 timestamps. An attacker could possibly use this issue to cause GLib to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2025-3360)

It was discovered that GLib incorrectly handled GString memory operations. An attacker could use this issue to cause GLib to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.04. (CVE-2025-6052)

It was discovered that GLib incorrectly handled creating temporary files. An attacker could possibly use this issue to access unauthorized data. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 25.04. (CVE-2025-7039)

References

Affected packages

Ubuntu:Pro:14.04:LTS / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/ubuntu/glib2.0@2.40.2-0ubuntu1.1+esm7?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.40.2-0ubuntu1.1+esm7

Affected versions

2.*
2.38.0-1ubuntu1
2.38.1-1
2.39.1-0ubuntu1
2.39.1-0ubuntu2
2.39.1-0ubuntu3
2.39.2-0ubuntu1
2.39.2-0ubuntu2
2.39.3-0ubuntu4
2.39.4-0ubuntu1
2.39.90-0ubuntu1
2.39.91-0ubuntu2
2.39.91-0ubuntu3
2.39.92-2
2.40.0-1
2.40.0-1ubuntu1
2.40.0-2
2.40.2-0ubuntu1
2.40.2-0ubuntu1.1
2.40.2-0ubuntu1.1+esm1
2.40.2-0ubuntu1.1+esm2
2.40.2-0ubuntu1.1+esm3
2.40.2-0ubuntu1.1+esm4
2.40.2-0ubuntu1.1+esm6

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-0"
        },
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-0-refdbg"
        },
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-bin"
        },
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-data"
        },
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-dev"
        },
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-tests"
        }
    ],
    "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:Pro:14.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-7039",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-13601",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-14087",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7942-2.json"

Ubuntu:Pro:16.04:LTS / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/ubuntu/glib2.0@2.48.2-0ubuntu4.8+esm5?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.48.2-0ubuntu4.8+esm5

Affected versions

2.*
2.46.1-1
2.46.1-2
2.47.1-1
2.47.3-3
2.47.4-1
2.47.5-1
2.47.6-1
2.48.0-1ubuntu3
2.48.0-1ubuntu4
2.48.1-1~ubuntu16.04.1
2.48.2-0ubuntu1
2.48.2-0ubuntu3
2.48.2-0ubuntu4
2.48.2-0ubuntu4.1
2.48.2-0ubuntu4.2
2.48.2-0ubuntu4.3
2.48.2-0ubuntu4.4
2.48.2-0ubuntu4.5
2.48.2-0ubuntu4.6
2.48.2-0ubuntu4.7
2.48.2-0ubuntu4.8
2.48.2-0ubuntu4.8+esm1
2.48.2-0ubuntu4.8+esm3
2.48.2-0ubuntu4.8+esm4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-0"
        },
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-0-refdbg"
        },
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-bin"
        },
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-data"
        },
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-dev"
        },
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-tests"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:Pro:16.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-7039",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-13601",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-14087",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7942-2.json"

Ubuntu:Pro:18.04:LTS / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/ubuntu/glib2.0@2.56.4-0ubuntu0.18.04.9+esm5?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.56.4-0ubuntu0.18.04.9+esm5

Affected versions

2.*
2.54.1-1ubuntu1
2.55.2-2ubuntu1
2.56.0-2ubuntu1
2.56.0-4ubuntu1
2.56.1-2ubuntu1
2.56.2-0ubuntu0.18.04.1
2.56.2-0ubuntu0.18.04.2
2.56.3-0ubuntu0.18.04.1
2.56.4-0ubuntu0.18.04.2
2.56.4-0ubuntu0.18.04.3
2.56.4-0ubuntu0.18.04.4
2.56.4-0ubuntu0.18.04.5
2.56.4-0ubuntu0.18.04.6
2.56.4-0ubuntu0.18.04.7
2.56.4-0ubuntu0.18.04.8
2.56.4-0ubuntu0.18.04.9
2.56.4-0ubuntu0.18.04.9+esm3
2.56.4-0ubuntu0.18.04.9+esm4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-0"
        },
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-bin"
        },
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-data"
        },
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-dev"
        },
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-dev-bin"
        },
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-tests"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:Pro:18.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-3360",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-7039",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-13601",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-14087",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7942-2.json"

Ubuntu:Pro:20.04:LTS / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/ubuntu/glib2.0@2.64.6-1~ubuntu20.04.9+esm1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.64.6-1~ubuntu20.04.9+esm1

Affected versions

2.*
2.62.1-1
2.63.1-2
2.63.1-2ubuntu1
2.63.3-1
2.63.3-3
2.63.5-2
2.64.0-1
2.64.1-1
2.64.2-1~fakesync1
2.64.3-1~ubuntu20.04.1
2.64.6-1~ubuntu20.04.1
2.64.6-1~ubuntu20.04.2
2.64.6-1~ubuntu20.04.3
2.64.6-1~ubuntu20.04.4
2.64.6-1~ubuntu20.04.6
2.64.6-1~ubuntu20.04.7
2.64.6-1~ubuntu20.04.8
2.64.6-1~ubuntu20.04.9

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.64.6-1~ubuntu20.04.9+esm1",
            "binary_name": "libglib2.0-0"
        },
        {
            "binary_version": "2.64.6-1~ubuntu20.04.9+esm1",
            "binary_name": "libglib2.0-bin"
        },
        {
            "binary_version": "2.64.6-1~ubuntu20.04.9+esm1",
            "binary_name": "libglib2.0-data"
        },
        {
            "binary_version": "2.64.6-1~ubuntu20.04.9+esm1",
            "binary_name": "libglib2.0-dev"
        },
        {
            "binary_version": "2.64.6-1~ubuntu20.04.9+esm1",
            "binary_name": "libglib2.0-dev-bin"
        },
        {
            "binary_version": "2.64.6-1~ubuntu20.04.9+esm1",
            "binary_name": "libglib2.0-tests"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:Pro:20.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-3360",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-7039",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-13601",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-14087",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7942-2.json"