CVE Vulnerabilities

CVE-2026-1485

Buffer Underwrite ('Buffer Underflow')

Published: Jan 27, 2026 | Modified: Feb 03, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
2.8 LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in Glibs content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

Weakness

The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.

Affected Software

NameVendorStart VersionEnd Version
Glib2.0Ubuntudevel*
Glib2.0Ubuntujammy*
Glib2.0Ubuntunoble*
Glib2.0Ubuntuquesting*

Potential Mitigations

References