Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2026-1489

Опубликовано: 27 янв. 2026
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5.4

Описание

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

РелизСтатусПримечание
devel

released

2.87.2-2
esm-infra-legacy/trusty

needed

esm-infra/bionic

needed

esm-infra/focal

needed

esm-infra/xenial

needed

jammy

released

2.72.4-0ubuntu2.9
noble

released

2.80.0-6ubuntu3.8
questing

released

2.86.0-2ubuntu0.3
upstream

released

2.86

Показывать по

EPSS

Процентиль: 18%
0.00057
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
redhat
2 месяца назад

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

CVSS3: 5.4
nvd
2 месяца назад

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

CVSS3: 5.4
debian
2 месяца назад

A flaw was found in GLib. An integer overflow vulnerability in its Uni ...

CVSS3: 5.4
github
2 месяца назад

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

suse-cvrf
около 2 месяцев назад

Security update for glib2

EPSS

Процентиль: 18%
0.00057
Низкий

5.4 Medium

CVSS3