Количество 7
Количество 7
CVE-2026-1489
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
CVE-2026-1489
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
CVE-2026-1489
A flaw was found in GLib. An integer overflow vulnerability in its Uni ...
GHSA-9m4g-m3p5-p6gm
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
SUSE-SU-2026:0373-1
Security update for glib2
SUSE-SU-2026:0372-1
Security update for glib2
openSUSE-SU-2026:20150-1
Security update for glib2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-1489 A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable. | CVSS3: 5.4 | 0% Низкий | 12 дней назад | |
CVE-2026-1489 A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable. | CVSS3: 5.4 | 0% Низкий | 12 дней назад | |
CVE-2026-1489 A flaw was found in GLib. An integer overflow vulnerability in its Uni ... | CVSS3: 5.4 | 0% Низкий | 12 дней назад | |
GHSA-9m4g-m3p5-p6gm A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable. | CVSS3: 5.4 | 0% Низкий | 12 дней назад | |
SUSE-SU-2026:0373-1 Security update for glib2 | 5 дней назад | |||
SUSE-SU-2026:0372-1 Security update for glib2 | 5 дней назад | |||
openSUSE-SU-2026:20150-1 Security update for glib2 | 6 дней назад |
Уязвимостей на страницу