Количество 6
Количество 6
CVE-2026-0988
A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
CVE-2026-0988
A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
CVE-2026-0988
A flaw was found in glib. Missing validation of offset and count param ...
SUSE-SU-2026:0286-1
Security update for glib2
SUSE-SU-2026:0266-1
Security update for glib2
GHSA-m2x7-c9gp-xc46
A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-0988 A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS). | CVSS3: 3.7 | 0% Низкий | 19 дней назад | |
CVE-2026-0988 A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS). | CVSS3: 3.7 | 0% Низкий | 19 дней назад | |
CVE-2026-0988 A flaw was found in glib. Missing validation of offset and count param ... | CVSS3: 3.7 | 0% Низкий | 19 дней назад | |
SUSE-SU-2026:0286-1 Security update for glib2 | 0% Низкий | 17 дней назад | ||
SUSE-SU-2026:0266-1 Security update for glib2 | 0% Низкий | 17 дней назад | ||
GHSA-m2x7-c9gp-xc46 A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS). | CVSS3: 3.7 | 0% Низкий | 19 дней назад |
Уязвимостей на страницу