Логотип exploitDog
bind:CVE-2026-0988
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-0988

Количество 6

Количество 6

ubuntu логотип

CVE-2026-0988

19 дней назад

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2026-0988

19 дней назад

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2026-0988

19 дней назад

A flaw was found in glib. Missing validation of offset and count param ...

CVSS3: 3.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0286-1

17 дней назад

Security update for glib2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0266-1

17 дней назад

Security update for glib2

EPSS: Низкий
github логотип

GHSA-m2x7-c9gp-xc46

19 дней назад

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-0988

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

CVSS3: 3.7
0%
Низкий
19 дней назад
nvd логотип
CVE-2026-0988

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

CVSS3: 3.7
0%
Низкий
19 дней назад
debian логотип
CVE-2026-0988

A flaw was found in glib. Missing validation of offset and count param ...

CVSS3: 3.7
0%
Низкий
19 дней назад
suse-cvrf логотип
SUSE-SU-2026:0286-1

Security update for glib2

0%
Низкий
17 дней назад
suse-cvrf логотип
SUSE-SU-2026:0266-1

Security update for glib2

0%
Низкий
17 дней назад
github логотип
GHSA-m2x7-c9gp-xc46

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

CVSS3: 3.7
0%
Низкий
19 дней назад

Уязвимостей на страницу