Issued:
2026-01-22
Updated:
2026-01-22

RHSA-2026:0991 - Moderate: glib2 security update


Synopsis

Moderate: glib2 security update

Type/Severity

Security Advisory Moderate

Topic

An update for glib2 is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.

Security Fix(es):

  • glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

ProductVersionArch
Red Hat Enterprise Linux for x86_648x86_64
Red Hat Enterprise Linux for Power, little endian8ppc64le
Red Hat Enterprise Linux for IBM z Systems8s390x
Red Hat Enterprise Linux for ARM 648aarch64
Red Hat CodeReady Linux Builder for x86_648x86_64
Red Hat CodeReady Linux Builder for Power, little endian8ppc64le
Red Hat CodeReady Linux Builder for IBM z Systems8s390x
Red Hat CodeReady Linux Builder for ARM 648aarch64

Updated Packages

  • glib2-devel-debuginfo-2.56.4-168.el8_10.x86_64.rpm
  • glib2-debugsource-2.56.4-168.el8_10.s390x.rpm
  • glib2-2.56.4-168.el8_10.s390x.rpm
  • glib2-devel-2.56.4-168.el8_10.aarch64.rpm
  • glib2-fam-debuginfo-2.56.4-168.el8_10.s390x.rpm
  • glib2-fam-debuginfo-2.56.4-168.el8_10.x86_64.rpm
  • glib2-debuginfo-2.56.4-168.el8_10.ppc64le.rpm
  • glib2-devel-2.56.4-168.el8_10.s390x.rpm
  • glib2-fam-debuginfo-2.56.4-168.el8_10.ppc64le.rpm
  • glib2-devel-debuginfo-2.56.4-168.el8_10.i686.rpm
  • glib2-static-2.56.4-168.el8_10.i686.rpm
  • glib2-tests-2.56.4-168.el8_10.ppc64le.rpm
  • glib2-tests-debuginfo-2.56.4-168.el8_10.aarch64.rpm
  • glib2-fam-debuginfo-2.56.4-168.el8_10.i686.rpm
  • glib2-fam-debuginfo-2.56.4-168.el8_10.aarch64.rpm
  • glib2-devel-debuginfo-2.56.4-168.el8_10.aarch64.rpm
  • glib2-2.56.4-168.el8_10.x86_64.rpm
  • glib2-static-2.56.4-168.el8_10.ppc64le.rpm
  • glib2-2.56.4-168.el8_10.aarch64.rpm
  • glib2-debuginfo-2.56.4-168.el8_10.aarch64.rpm
  • glib2-debuginfo-2.56.4-168.el8_10.x86_64.rpm
  • glib2-tests-debuginfo-2.56.4-168.el8_10.x86_64.rpm
  • glib2-2.56.4-168.el8_10.src.rpm
  • glib2-static-2.56.4-168.el8_10.x86_64.rpm
  • glib2-tests-debuginfo-2.56.4-168.el8_10.ppc64le.rpm
  • glib2-tests-2.56.4-168.el8_10.aarch64.rpm
  • glib2-2.56.4-168.el8_10.ppc64le.rpm
  • glib2-devel-2.56.4-168.el8_10.ppc64le.rpm
  • glib2-static-2.56.4-168.el8_10.s390x.rpm
  • glib2-fam-2.56.4-168.el8_10.aarch64.rpm
  • glib2-debugsource-2.56.4-168.el8_10.i686.rpm
  • glib2-fam-2.56.4-168.el8_10.s390x.rpm
  • glib2-tests-2.56.4-168.el8_10.s390x.rpm
  • glib2-tests-2.56.4-168.el8_10.x86_64.rpm
  • glib2-debugsource-2.56.4-168.el8_10.ppc64le.rpm
  • glib2-tests-debuginfo-2.56.4-168.el8_10.i686.rpm
  • glib2-static-2.56.4-168.el8_10.aarch64.rpm
  • glib2-tests-debuginfo-2.56.4-168.el8_10.s390x.rpm
  • glib2-fam-2.56.4-168.el8_10.x86_64.rpm
  • glib2-devel-2.56.4-168.el8_10.x86_64.rpm
  • glib2-fam-2.56.4-168.el8_10.ppc64le.rpm
  • glib2-2.56.4-168.el8_10.i686.rpm
  • glib2-debuginfo-2.56.4-168.el8_10.s390x.rpm
  • glib2-devel-debuginfo-2.56.4-168.el8_10.ppc64le.rpm
  • glib2-devel-debuginfo-2.56.4-168.el8_10.s390x.rpm
  • glib2-doc-2.56.4-168.el8_10.noarch.rpm
  • glib2-debugsource-2.56.4-168.el8_10.x86_64.rpm
  • glib2-debuginfo-2.56.4-168.el8_10.i686.rpm
  • glib2-debugsource-2.56.4-168.el8_10.aarch64.rpm
  • glib2-devel-2.56.4-168.el8_10.i686.rpm

Fixes

CVEs

References


Additional information