Debian Package Tracker
Register | Log in
Subscribe

glib2.0

Choose email to subscribe with

general
  • source: glib2.0 (main)
  • version: 2.86.3-5
  • maintainer: Debian GNOME Maintainers (archive) (DMD)
  • uploaders: Simon McVittie [DMD] – Marco Trevisan (Treviño) [DMD] – Jeremy Bícha [DMD]
  • arch: all any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.66.8-1+deb11u4
  • o-o-sec: 2.66.8-1+deb11u7
  • oldstable: 2.74.6-2+deb12u8
  • old-sec: 2.74.6-2+deb12u2
  • stable: 2.84.4-3~deb13u2
  • testing: 2.86.3-5
  • unstable: 2.86.3-5
  • exp: 2.87.2-2
versioned links
  • 2.66.8-1+deb11u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.66.8-1+deb11u7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.74.6-2+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.74.6-2+deb12u8: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.84.4-3~deb13u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.86.3-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.87.2-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • gir1.2-girepository-3.0
  • gir1.2-girepository-3.0-dev
  • gir1.2-glib-2.0
  • gir1.2-glib-2.0-dev
  • girepository-tools
  • libgio-2.0-dev
  • libgio-2.0-dev-bin
  • libgirepository-2.0-0
  • libgirepository-2.0-dev
  • libglib2.0-0t64 (2 bugs: 0, 1, 1, 0)
  • libglib2.0-bin (9 bugs: 0, 8, 1, 0)
  • libglib2.0-data (1 bugs: 0, 0, 1, 0)
  • libglib2.0-dev (5 bugs: 0, 3, 2, 0)
  • libglib2.0-dev-bin
  • libglib2.0-doc (3 bugs: 0, 2, 1, 0)
  • libglib2.0-tests
  • libglib2.0-udeb
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 0:15:33
    Last run: 2026-01-30T03:05:13.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:10:05
    Last run: 2026-02-04T06:22:15.000Z
    Previous status: unknown

  • stable: pass (log)
    The tests ran in 0:10:13
    Last run: 2025-11-10T02:08:32.000Z
    Previous status: unknown

Created: 2026-01-30 Last update: 2026-02-07 10:01
4 security issues in bullseye high

There are 4 open security issues in bullseye.

4 important issues:
  • CVE-2026-0988: A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
  • CVE-2026-1484: A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.
  • CVE-2026-1485: A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.
  • CVE-2026-1489: A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
Created: 2026-01-16 Last update: 2026-01-31 14:31
Depends on packages which need a new maintainer normal
The packages that glib2.0 depends on which need a new maintainer are:
  • docbook-xml (#802368)
    • Build-Depends: docbook-xml
  • docbook-xsl (#802370)
    • Build-Depends: docbook-xsl
Created: 2023-09-01 Last update: 2026-02-07 08:01
lintian reports 8 warnings normal
Lintian reports 8 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-01-29 Last update: 2026-01-29 12:30
4 low-priority security issues in trixie low

There are 4 open security issues in trixie.

4 issues left for the package maintainer to handle:
  • CVE-2026-0988: (needs triaging) A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
  • CVE-2026-1484: (needs triaging) A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.
  • CVE-2026-1485: (needs triaging) A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.
  • CVE-2026-1489: (needs triaging) A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-01-16 Last update: 2026-01-31 14:31
4 low-priority security issues in bookworm low

There are 4 open security issues in bookworm.

4 issues left for the package maintainer to handle:
  • CVE-2026-0988: (needs triaging) A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
  • CVE-2026-1484: (needs triaging) A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.
  • CVE-2026-1485: (needs triaging) A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.
  • CVE-2026-1489: (needs triaging) A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-01-16 Last update: 2026-01-31 14:31
debian/patches: 8 patches to forward upstream low

Among the 27 debian patches available in version 2.86.3-5 of the package, we noticed the following issues:

  • 8 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-01-29 09:31
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2026-01-01 Last update: 2026-01-01 11:33
news
[rss feed]
  • [2026-01-31] glib2.0 2.86.3-5 MIGRATED to testing (Debian testing watch)
  • [2026-01-29] Accepted glib2.0 2.87.2-2 (source) into experimental (Simon McVittie)
  • [2026-01-28] Accepted glib2.0 2.86.3-5 (source) into unstable (Simon McVittie)
  • [2026-01-23] Accepted glib2.0 2.87.2-1 (source) into experimental (Jeremy Bícha)
  • [2026-01-10] glib2.0 2.86.3-4 MIGRATED to testing (Debian testing watch)
  • [2026-01-05] Accepted glib2.0 2.87.1-1 (source) into experimental (Jeremy Bícha)
  • [2026-01-01] Accepted glib2.0 2.86.3-4 (source) into unstable (Jeremy Bícha)
  • [2025-12-31] Accepted glib2.0 2.86.3-3 (source) into unstable (Jeremy Bícha)
  • [2025-12-31] Accepted glib2.0 2.86.3-2 (source) into unstable (Jeremy Bícha)
  • [2025-12-26] Accepted glib2.0 2.74.6-2+deb12u8 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Emilio Pozuelo Monfort)
  • [2025-12-21] Accepted glib2.0 2.84.4-3~deb13u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Simon McVittie)
  • [2025-12-17] glib2.0 2.86.3-1 MIGRATED to testing (Debian testing watch)
  • [2025-12-16] Accepted glib2.0 2.66.8-1+deb11u7 (source) into oldoldstable-security (Emilio Pozuelo Monfort)
  • [2025-12-09] Accepted glib2.0 2.86.3-1 (source) into unstable (Simon McVittie)
  • [2025-11-24] glib2.0 2.86.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-19] Accepted glib2.0 2.86.2-1 (source) into unstable (Simon McVittie)
  • [2025-11-15] glib2.0 2.86.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-11-03] Accepted glib2.0 2.86.1-2 (source) into unstable (Simon McVittie)
  • [2025-10-24] glib2.0 2.86.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-21] Accepted glib2.0 2.86.1-1 (source) into unstable (Simon McVittie)
  • [2025-10-21] Accepted glib2.0 2.86.0-7 (source) into unstable (Simon McVittie)
  • [2025-10-19] glib2.0 2.86.0-5 MIGRATED to testing (Debian testing watch)
  • [2025-10-14] Accepted glib2.0 2.86.0-6 (source) into experimental (Simon McVittie)
  • [2025-10-13] Accepted glib2.0 2.86.0-5 (source) into unstable (Simon McVittie)
  • [2025-09-19] Accepted glib2.0 2.86.0-4 (source) into experimental (Simon McVittie)
  • [2025-09-18] Accepted glib2.0 2.86.0-3 (source) into experimental (Simon McVittie)
  • [2025-09-12] Accepted glib2.0 2.86.0-2 (source) into experimental (Marco Trevisan (Treviño)) (signed by: Marco Trevisan)
  • [2025-09-11] Accepted glib2.0 2.86.0-1 (source) into experimental (Marco Trevisan (Treviño)) (signed by: Marco Trevisan)
  • [2025-08-30] Accepted glib2.0 2.74.6-2+deb12u7 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Simon McVittie)
  • [2025-08-24] Accepted glib2.0 2.84.4-3~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Simon McVittie)
  • 1
  • 2
bugs [bug history graph]
  • all: 65 68
  • RC: 0
  • I&N: 51 53
  • M&W: 14 15
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 8)
  • buildd: logs, exp, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (-, 75)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.86.3-4
  • 153 bugs (4 patches)

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing