Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-1484

Опубликовано: 27 янв. 2026
Источник: debian
EPSS Низкий

Описание

A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib2.0fixed2.86.3-5package
glib2.0no-dsatrixiepackage
glib2.0no-dsabookwormpackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib/-/issues/3870

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4978

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4979

EPSS

Процентиль: 14%
0.00045
Низкий

Связанные уязвимости

CVSS3: 4.2
ubuntu
11 дней назад

A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.

CVSS3: 4.2
nvd
11 дней назад

A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.

CVSS3: 4.2
github
11 дней назад

A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.

suse-cvrf
3 дня назад

Security update for glib2

suse-cvrf
3 дня назад

Security update for glib2

EPSS

Процентиль: 14%
0.00045
Низкий