A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
References
Configurations
No configuration.
History
24 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
15 Apr 2026, 00:35
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
19 Mar 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Jan 2026, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-21 12:15
Updated : 2026-04-24 21:16
NVD link : CVE-2026-0988
Mitre link : CVE-2026-0988
CVE.ORG link : CVE-2026-0988
JSON object : View
Products Affected
No product.
CWE
CWE-190
Integer Overflow or Wraparound
