Debian Package Tracker
Register | Log in
Subscribe

glib2.0

Choose email to subscribe with

general
  • source: glib2.0 (main)
  • version: 2.87.2-3
  • maintainer: Debian GNOME Maintainers (archive) (DMD)
  • uploaders: Simon McVittie [DMD] – Marco Trevisan (Treviño) [DMD] – Jeremy Bícha [DMD]
  • arch: all any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.66.8-1+deb11u4
  • o-o-sec: 2.66.8-1+deb11u7
  • oldstable: 2.74.6-2+deb12u8
  • old-sec: 2.74.6-2+deb12u2
  • stable: 2.84.4-3~deb13u2
  • testing: 2.86.3-5
  • unstable: 2.87.2-3
versioned links
  • 2.66.8-1+deb11u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.66.8-1+deb11u7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.74.6-2+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.74.6-2+deb12u8: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.84.4-3~deb13u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.86.3-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.87.2-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • gir1.2-girepository-3.0
  • gir1.2-girepository-3.0-dev
  • gir1.2-glib-2.0
  • gir1.2-glib-2.0-dev
  • girepository-tools
  • libgio-2.0-dev
  • libgio-2.0-dev-bin
  • libgirepository-2.0-0
  • libgirepository-2.0-dev
  • libglib2.0-0t64 (2 bugs: 0, 1, 1, 0)
  • libglib2.0-bin (9 bugs: 0, 8, 1, 0)
  • libglib2.0-data (1 bugs: 0, 0, 1, 0)
  • libglib2.0-dev (5 bugs: 0, 3, 2, 0)
  • libglib2.0-dev-bin
  • libglib2.0-doc (3 bugs: 0, 2, 1, 0)
  • libglib2.0-tests
  • libglib2.0-udeb
action needed
4 security issues in bullseye high

There are 4 open security issues in bullseye.

4 important issues:
  • CVE-2026-0988: A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
  • CVE-2026-1484: A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.
  • CVE-2026-1485: A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.
  • CVE-2026-1489: A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
Created: 2026-01-16 Last update: 2026-02-07 22:30
Depends on packages which need a new maintainer normal
The packages that glib2.0 depends on which need a new maintainer are:
  • docbook-xml (#802368)
    • Build-Depends: docbook-xml
  • docbook-xsl (#802370)
    • Build-Depends: docbook-xsl
Created: 2023-09-01 Last update: 2026-02-10 09:02
lintian reports 8 warnings normal
Lintian reports 8 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-02-08 Last update: 2026-02-08 05:30
debian/patches: 8 patches to forward upstream low

Among the 27 debian patches available in version 2.87.2-3 of the package, we noticed the following issues:

  • 8 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-02-08 10:02
4 low-priority security issues in trixie low

There are 4 open security issues in trixie.

4 issues left for the package maintainer to handle:
  • CVE-2026-0988: (needs triaging) A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
  • CVE-2026-1484: (needs triaging) A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.
  • CVE-2026-1485: (needs triaging) A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.
  • CVE-2026-1489: (needs triaging) A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-01-16 Last update: 2026-02-07 22:30
4 low-priority security issues in bookworm low

There are 4 open security issues in bookworm.

4 issues left for the package maintainer to handle:
  • CVE-2026-0988: (needs triaging) A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
  • CVE-2026-1484: (needs triaging) A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.
  • CVE-2026-1485: (needs triaging) A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.
  • CVE-2026-1489: (needs triaging) A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-01-16 Last update: 2026-02-07 22:30
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2026-01-01 Last update: 2026-01-01 11:33
testing migrations
  • excuses:
    • Migration status for glib2.0 (2.86.3-5 to 2.87.2-3): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for automake/1:1.18.1-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for ayatana-indicator-session: amd64: Test triggered (failure will be ignored), arm64: Test triggered (failure will be ignored), i386: Test triggered (failure will be ignored), ppc64el: Test triggered (failure will be ignored), riscv64: Test triggered (failure will be ignored), s390x: Test triggered (failure will be ignored)
    • ∙ ∙ Autopkgtest for cyrus-imapd/3.12.1-3: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Failed (not a regression) ♻ (reference ♻), ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for feedbackd/0.8.8-2: ppc64el: Pass ♻, s390x: Pass ♻
    • ∙ ∙ Autopkgtest for gdpc/2.2.5-17: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Failed (not a regression) ♻ (reference ♻), ppc64el: Regression ♻ (reference ♻), riscv64: Regression ♻ (reference ♻), s390x: Regression ♻ (reference ♻)
    • ∙ ∙ Autopkgtest for glib2.0/2.87.2-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for gnome-autoar/0.4.5-4: ppc64el: No tests, superficial or marked flaky ♻, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for keyman/18.0.245-1: ppc64el: Pass ♻, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for libheif/1.21.2-1: ppc64el: Pass ♻, s390x: Pass ♻
    • ∙ ∙ Autopkgtest for libreoffice/4:25.8.4-1: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Test triggered (failure will be ignored), ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for openjdk-21/21.0.10+7-1: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Pass, ppc64el: Test triggered (failure will be ignored), riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for openjdk-25/25.0.2+10-1: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Pass, ppc64el: Test triggered (failure will be ignored), riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for openjdk-26/26~32ea-1: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Pass, ppc64el: Test triggered (failure will be ignored), riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for pangomm2.48/2.56.1-1: ppc64el: No tests, superficial or marked flaky ♻, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for rust-glib/0.21.5-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for rust-gst-plugin-fallbackswitch/0.14.3-1: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: Test triggered, ppc64el: Test triggered, riscv64: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for rust-gst-plugin-gtk4/0.14.4-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for thunderbird/1:140.7.1esr-1: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Pass, ppc64el: No tests, superficial or marked flaky ♻, riscv64: Test triggered (failure will be ignored)
    • ∙ ∙ Too young, only 2 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/g/glib2.0.html
    • ∙ ∙ Reproducibility check waiting for results on amd64
    • ∙ ∙ Reproducibility check waiting for results on arm64
    • ∙ ∙ Reproducibility check waiting for results on armhf
    • ∙ ∙ Reproducibility check waiting for results on i386
    • ∙ ∙ Reproducibility check waiting for results on ppc64el
    • Not considered
news
[rss feed]
  • [2026-02-07] Accepted glib2.0 2.87.2-3 (source) into unstable (Jeremy Bícha)
  • [2026-01-31] glib2.0 2.86.3-5 MIGRATED to testing (Debian testing watch)
  • [2026-01-29] Accepted glib2.0 2.87.2-2 (source) into experimental (Simon McVittie)
  • [2026-01-28] Accepted glib2.0 2.86.3-5 (source) into unstable (Simon McVittie)
  • [2026-01-23] Accepted glib2.0 2.87.2-1 (source) into experimental (Jeremy Bícha)
  • [2026-01-10] glib2.0 2.86.3-4 MIGRATED to testing (Debian testing watch)
  • [2026-01-05] Accepted glib2.0 2.87.1-1 (source) into experimental (Jeremy Bícha)
  • [2026-01-01] Accepted glib2.0 2.86.3-4 (source) into unstable (Jeremy Bícha)
  • [2025-12-31] Accepted glib2.0 2.86.3-3 (source) into unstable (Jeremy Bícha)
  • [2025-12-31] Accepted glib2.0 2.86.3-2 (source) into unstable (Jeremy Bícha)
  • [2025-12-26] Accepted glib2.0 2.74.6-2+deb12u8 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Emilio Pozuelo Monfort)
  • [2025-12-21] Accepted glib2.0 2.84.4-3~deb13u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Simon McVittie)
  • [2025-12-17] glib2.0 2.86.3-1 MIGRATED to testing (Debian testing watch)
  • [2025-12-16] Accepted glib2.0 2.66.8-1+deb11u7 (source) into oldoldstable-security (Emilio Pozuelo Monfort)
  • [2025-12-09] Accepted glib2.0 2.86.3-1 (source) into unstable (Simon McVittie)
  • [2025-11-24] glib2.0 2.86.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-19] Accepted glib2.0 2.86.2-1 (source) into unstable (Simon McVittie)
  • [2025-11-15] glib2.0 2.86.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-11-03] Accepted glib2.0 2.86.1-2 (source) into unstable (Simon McVittie)
  • [2025-10-24] glib2.0 2.86.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-21] Accepted glib2.0 2.86.1-1 (source) into unstable (Simon McVittie)
  • [2025-10-21] Accepted glib2.0 2.86.0-7 (source) into unstable (Simon McVittie)
  • [2025-10-19] glib2.0 2.86.0-5 MIGRATED to testing (Debian testing watch)
  • [2025-10-14] Accepted glib2.0 2.86.0-6 (source) into experimental (Simon McVittie)
  • [2025-10-13] Accepted glib2.0 2.86.0-5 (source) into unstable (Simon McVittie)
  • [2025-09-19] Accepted glib2.0 2.86.0-4 (source) into experimental (Simon McVittie)
  • [2025-09-18] Accepted glib2.0 2.86.0-3 (source) into experimental (Simon McVittie)
  • [2025-09-12] Accepted glib2.0 2.86.0-2 (source) into experimental (Marco Trevisan (Treviño)) (signed by: Marco Trevisan)
  • [2025-09-11] Accepted glib2.0 2.86.0-1 (source) into experimental (Marco Trevisan (Treviño)) (signed by: Marco Trevisan)
  • [2025-08-30] Accepted glib2.0 2.74.6-2+deb12u7 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Simon McVittie)
  • 1
  • 2
bugs [bug history graph]
  • all: 65 68
  • RC: 0
  • I&N: 51 53
  • M&W: 14 15
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 8)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (-, 75)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.87.2-2
  • 153 bugs (4 patches)

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing