Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2026-0988

Опубликовано: 21 янв. 2026
Источник: ubuntu
Приоритет: medium
CVSS3: 3.7

Описание

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

РелизСтатусПримечание
devel

pending

2.87.2-2
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needs-triage

esm-infra/focal

needs-triage

esm-infra/xenial

needs-triage

jammy

released

2.72.4-0ubuntu2.8
noble

released

2.80.0-6ubuntu3.7
questing

released

2.86.0-2ubuntu0.2
upstream

released

2.87.1-1

Показывать по

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
nvd
18 дней назад

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

CVSS3: 3.7
debian
18 дней назад

A flaw was found in glib. Missing validation of offset and count param ...

suse-cvrf
15 дней назад

Security update for glib2

suse-cvrf
16 дней назад

Security update for glib2

CVSS3: 3.7
github
18 дней назад

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

3.7 Low

CVSS3