A flaw was found in Glibs content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.
The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Glib2.0 | Ubuntu | devel | * |
| Glib2.0 | Ubuntu | jammy | * |
| Glib2.0 | Ubuntu | noble | * |
| Glib2.0 | Ubuntu | questing | * |