Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-1489

Опубликовано: 27 янв. 2026
Источник: debian

Описание

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glib2.0fixed2.86.3-5package
glib2.0no-dsatrixiepackage
glib2.0no-dsabookwormpackage

Примечания

  • https://gitlab.gnome.org/GNOME/glib/-/issues/3872

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4983

  • https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4984

Связанные уязвимости

CVSS3: 5.4
ubuntu
11 дней назад

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

CVSS3: 5.4
nvd
11 дней назад

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

CVSS3: 5.4
github
11 дней назад

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.