DEBIAN-CVE-2026-1484

Source
https://security-tracker.debian.org/tracker/CVE-2026-1484
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1484.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-1484
Upstream
  • CVE-2026-1484
Downstream
Published
2026-01-27T14:15:56.050Z
Modified
2026-03-17T02:52:33.152403Z
Severity
  • 4.2 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L CVSS Calculator
Summary
[none]
Details

A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.

References

Affected packages

Debian:11 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.66.8-1+deb11u8

Affected versions

2.*
2.66.8-1
2.66.8-1+deb11u1
2.66.8-1+deb11u2
2.66.8-1+deb11u3
2.66.8-1+deb11u4
2.66.8-1+deb11u5
2.66.8-1+deb11u6
2.66.8-1+deb11u7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1484.json"

Debian:12 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.74.6-2
2.74.6-2+deb12u1
2.74.6-2+deb12u2
2.74.6-2+deb12u3
2.74.6-2+deb12u4
2.74.6-2+deb12u5
2.74.6-2+deb12u6
2.74.6-2+deb12u7
2.74.6-2+deb12u8
2.75.0-1
2.75.2-1
2.75.3-1
2.75.3-2
2.75.3-3
2.75.4-1
2.76.0-1
2.76.1-1
2.76.2-1
2.76.3-1
2.76.4-1
2.76.4-2
2.76.4-3
2.76.4-4
2.77.0-1
2.77.1-1
2.77.1-2
2.77.2-1
2.77.3-1
2.78.0-1
2.78.0-2
2.78.1-1
2.78.1-2
2.78.1-3
2.78.1-4
2.78.2-1
2.78.3-1
2.78.3-2
2.78.4-1
2.78.4-2
2.78.4-2.1
2.78.4-3
2.78.4-4
2.78.4-5
2.78.4-6
2.78.4-7
2.79.0+git20240110~g38f5ba3c-1
2.79.0+git20240110~g38f5ba3c-2
2.79.0+git20240119~62ee8bf6-1
2.79.1-1
2.79.1-1.1~exp1
2.79.2-1
2.79.3-1
2.79.3-2
2.79.3-3
2.80.0-1
2.80.0-2
2.80.0-3
2.80.0-4
2.80.0-5
2.80.0-6
2.80.0-7
2.80.0-8
2.80.0-9
2.80.0-10
2.80.1-1
2.80.2-1
2.80.2-2
2.80.3-1
2.80.4-1
2.81.0-1
2.81.1-1
2.81.1-2
2.81.1-3
2.81.2-1
2.82.0-1
2.82.0-2
2.82.1-1
2.82.2-1
2.82.2-2
2.82.2-3
2.82.3-1
2.82.3-2
2.82.4-1
2.82.4-2
2.83.2-1
2.83.2-2
2.83.3-1
2.83.3-2
2.83.4-1
2.83.5-1
2.84.0-1
2.84.0-2
2.84.1-1
2.84.1-2
2.84.1-3
2.84.2-1
2.84.3-1
2.84.4-1
2.84.4-2
2.84.4-3~deb13u1
2.84.4-3~deb13u2
2.84.4-3
2.85.1-1
2.85.1-2
2.85.2-2
2.85.3-1
2.85.4-1
2.86.0-1
2.86.0-2
2.86.0-3
2.86.0-4
2.86.0-5
2.86.0-6
2.86.0-7
2.86.1-1
2.86.1-2
2.86.2-1
2.86.3-1
2.86.3-2
2.86.3-3
2.86.3-4
2.86.3-5
2.87.1-1
2.87.2-1
2.87.2-2
2.87.2-3
2.87.3~gitlab0-1
2.87.3-1
2.87.5-1
2.88.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1484.json"

Debian:13 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.84.3-1
2.84.4-1
2.84.4-2
2.84.4-3~deb13u1
2.84.4-3~deb13u2
2.84.4-3
2.85.1-1
2.85.1-2
2.85.2-2
2.85.3-1
2.85.4-1
2.86.0-1
2.86.0-2
2.86.0-3
2.86.0-4
2.86.0-5
2.86.0-6
2.86.0-7
2.86.1-1
2.86.1-2
2.86.2-1
2.86.3-1
2.86.3-2
2.86.3-3
2.86.3-4
2.86.3-5
2.87.1-1
2.87.2-1
2.87.2-2
2.87.2-3
2.87.3~gitlab0-1
2.87.3-1
2.87.5-1
2.88.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1484.json"

Debian:14 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.86.3-5

Affected versions

2.*
2.84.3-1
2.84.4-1
2.84.4-2
2.84.4-3~deb13u1
2.84.4-3~deb13u2
2.84.4-3
2.85.1-1
2.85.1-2
2.85.2-2
2.85.3-1
2.85.4-1
2.86.0-1
2.86.0-2
2.86.0-3
2.86.0-4
2.86.0-5
2.86.0-6
2.86.0-7
2.86.1-1
2.86.1-2
2.86.2-1
2.86.3-1
2.86.3-2
2.86.3-3
2.86.3-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1484.json"