A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
References
Configurations
No configuration.
History
21 Jan 2026, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-21 12:15
Updated : 2026-01-26 15:04
NVD link : CVE-2026-0988
Mitre link : CVE-2026-0988
CVE.ORG link : CVE-2026-0988
JSON object : View
Products Affected
No product.
CWE
CWE-190
Integer Overflow or Wraparound
