Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-1489

Опубликовано: 27 янв. 2026
Источник: debian
EPSS Низкий

Описание

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib2.0fixed2.86.3-5package
glib2.0no-dsatrixiepackage
glib2.0no-dsabookwormpackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib/-/issues/3872

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4983

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4984

EPSS

Процентиль: 18%
0.00057
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
2 месяца назад

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

CVSS3: 5.4
redhat
2 месяца назад

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

CVSS3: 5.4
nvd
2 месяца назад

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

CVSS3: 5.4
github
2 месяца назад

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

suse-cvrf
около 2 месяцев назад

Security update for glib2

EPSS

Процентиль: 18%
0.00057
Низкий