Search CVE reports


Toggle filters

1 – 10 of 37 results


CVE-2026-1489

Medium priority
Needs evaluation

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker...

1 affected package

glib2.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glib2.0 Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2026-1485

Medium priority
Needs evaluation

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This...

1 affected package

glib2.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glib2.0 Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2026-1484

Medium priority
Needs evaluation

A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory...

1 affected package

glib2.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glib2.0 Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2026-0988

Medium priority

Some fixes available 3 of 7

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this...

1 affected package

glib2.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glib2.0 Fixed Fixed Needs evaluation Needs evaluation
Show less packages

CVE-2025-14512

Medium priority

Some fixes available 4 of 8

A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or...

1 affected package

glib2.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glib2.0 Fixed Fixed Needs evaluation Needs evaluation
Show less packages

CVE-2025-14087

Medium priority

Some fixes available 4 of 8

A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing...

1 affected package

glib2.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glib2.0 Fixed Fixed Needs evaluation Needs evaluation
Show less packages

CVE-2025-13601

Medium priority

Some fixes available 4 of 8

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which...

1 affected package

glib2.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glib2.0 Fixed Fixed Needs evaluation Needs evaluation
Show less packages

CVE-2025-7039

Low priority

Some fixes available 3 of 7

A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating...

1 affected package

glib2.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glib2.0 Fixed Fixed Needs evaluation Needs evaluation
Show less packages

CVE-2025-4056

Medium priority
Not affected

A flaw was found in GLib. A denial of service on Windows platforms may occur if an application attempts to spawn a program using long command lines.

1 affected package

glib2.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glib2.0 Not affected Not affected Not affected Not affected
Show less packages

CVE-2025-6052

Low priority

Some fixes available 2 of 3

A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it...

1 affected package

glib2.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glib2.0 Fixed Not affected Not affected Not affected
Show less packages