Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2026-1485

Опубликовано: 27 янв. 2026
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 2.8

Описание

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

РелизСтатусПримечание
devel

released

2.87.2-2
esm-infra-legacy/trusty

needed

esm-infra/bionic

needed

esm-infra/focal

needed

esm-infra/xenial

needed

jammy

released

2.72.4-0ubuntu2.9
noble

released

2.80.0-6ubuntu3.8
questing

released

2.86.0-2ubuntu0.3
upstream

released

2.86

Показывать по

EPSS

Процентиль: 0%
0.00005
Низкий

2.8 Low

CVSS3

Связанные уязвимости

CVSS3: 2.8
redhat
2 месяца назад

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

CVSS3: 2.8
nvd
2 месяца назад

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

CVSS3: 2.8
debian
2 месяца назад

A flaw was found in Glib's content type parsing logic. This buffer und ...

CVSS3: 2.8
github
2 месяца назад

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

suse-cvrf
около 2 месяцев назад

Security update for glib2

EPSS

Процентиль: 0%
0.00005
Низкий

2.8 Low

CVSS3