Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-1485

Опубликовано: 27 янв. 2026
Источник: debian

Описание

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib2.0fixed2.86.3-5package
glib2.0no-dsatrixiepackage
glib2.0no-dsabookwormpackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib/-/issues/3871

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4980

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4981

Связанные уязвимости

CVSS3: 2.8
ubuntu
11 дней назад

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

CVSS3: 2.8
nvd
11 дней назад

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

CVSS3: 2.8
github
11 дней назад

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

suse-cvrf
4 дня назад

Security update for glib2

suse-cvrf
4 дня назад

Security update for glib2