Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-0988

Опубликовано: 21 янв. 2026
Источник: debian

Описание

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib2.0fixed2.87.1-1experimentalpackage
glib2.0fixed2.86.3-5package
glib2.0no-dsatrixiepackage
glib2.0no-dsabookwormpackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib/-/issues/3851

  • Fixed by: https://gitlab.gnome.org/GNOME/glib/-/commit/c5766cff61ffce0b8e787eae09908ac348338e5f (2.87.1)

Связанные уязвимости

CVSS3: 3.7
ubuntu
18 дней назад

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

CVSS3: 3.7
nvd
18 дней назад

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

suse-cvrf
15 дней назад

Security update for glib2

suse-cvrf
16 дней назад

Security update for glib2

CVSS3: 3.7
github
18 дней назад

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).