DEBIAN-CVE-2026-1485

Source
https://security-tracker.debian.org/tracker/CVE-2026-1485
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1485.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-1485
Upstream
  • CVE-2026-1485
Published
2026-01-27T14:15:56.223Z
Modified
2026-01-31T13:19:37.262467Z
Severity
  • 2.8 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

References

Affected packages

Debian:11 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.66.8-1
2.66.8-1+deb11u1
2.66.8-1+deb11u2
2.66.8-1+deb11u3
2.66.8-1+deb11u4
2.66.8-1+deb11u5
2.66.8-1+deb11u6
2.66.8-1+deb11u7
2.67.1-1
2.67.2-1
2.67.3-1
2.67.3+git20210214-1
2.67.4-1
2.67.5-1
2.67.5-2
2.67.6-1
2.68.0-1
2.68.1-1
2.68.1-2
2.68.3-1
2.68.3-2
2.68.4-1
2.70.0-1
2.70.0-2
2.70.0-3
2.70.1-1
2.70.2-1
2.70.3-1
2.70.4-1
2.70.5-1
2.71.0-1
2.71.0-2
2.71.1-1
2.71.2-1
2.71.3-1
2.72.0-1
2.72.1-1
2.72.2-1
2.72.2-2
2.72.3-1
2.73.1-1
2.73.2-1
2.73.3-1
2.73.3-2
2.73.3-3
2.74.0-1
2.74.0-2
2.74.0-3
2.74.1-1
2.74.1-2
2.74.2-1
2.74.3-1
2.74.4-1
2.74.5-1
2.74.6-1
2.74.6-2
2.75.0-1
2.75.2-1
2.75.3-1
2.75.3-2
2.75.3-3
2.75.4-1
2.76.0-1
2.76.1-1
2.76.2-1
2.76.3-1
2.76.4-1
2.76.4-2
2.76.4-3
2.76.4-4
2.77.0-1
2.77.1-1
2.77.1-2
2.77.2-1
2.77.3-1
2.78.0-1
2.78.0-2
2.78.1-1
2.78.1-2
2.78.1-3
2.78.1-4
2.78.2-1
2.78.3-1
2.78.3-2
2.78.4-1
2.78.4-2
2.78.4-2.1
2.78.4-3
2.78.4-4
2.78.4-5
2.78.4-6
2.78.4-7
2.79.0+git20240110~g38f5ba3c-1
2.79.0+git20240110~g38f5ba3c-2
2.79.0+git20240119~62ee8bf6-1
2.79.1-1
2.79.1-1.1~exp1
2.79.2-1
2.79.3-1
2.79.3-2
2.79.3-3
2.80.0-1
2.80.0-2
2.80.0-3
2.80.0-4
2.80.0-5
2.80.0-6
2.80.0-7
2.80.0-8
2.80.0-9
2.80.0-10
2.80.1-1
2.80.2-1
2.80.2-2
2.80.3-1
2.80.4-1
2.81.0-1
2.81.1-1
2.81.1-2
2.81.1-3
2.81.2-1
2.82.0-1
2.82.0-2
2.82.1-1
2.82.2-1
2.82.2-2
2.82.2-3
2.82.3-1
2.82.3-2
2.82.4-1
2.82.4-2
2.83.2-1
2.83.2-2
2.83.3-1
2.83.3-2
2.83.4-1
2.83.5-1
2.84.0-1
2.84.0-2
2.84.1-1
2.84.1-2
2.84.1-3
2.84.2-1
2.84.3-1
2.84.4-1
2.84.4-2
2.84.4-3~deb13u1
2.84.4-3~deb13u2
2.84.4-3
2.85.1-1
2.85.1-2
2.85.2-2
2.85.3-1
2.85.4-1
2.86.0-1
2.86.0-2
2.86.0-3
2.86.0-4
2.86.0-5
2.86.0-6
2.86.0-7
2.86.1-1
2.86.1-2
2.86.2-1
2.86.3-1
2.86.3-2
2.86.3-3
2.86.3-4
2.86.3-5
2.87.1-1
2.87.2-1
2.87.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1485.json"

Debian:12 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.74.6-2
2.74.6-2+deb12u1
2.74.6-2+deb12u2
2.74.6-2+deb12u3
2.74.6-2+deb12u4
2.74.6-2+deb12u5
2.74.6-2+deb12u6
2.74.6-2+deb12u7
2.74.6-2+deb12u8
2.75.0-1
2.75.2-1
2.75.3-1
2.75.3-2
2.75.3-3
2.75.4-1
2.76.0-1
2.76.1-1
2.76.2-1
2.76.3-1
2.76.4-1
2.76.4-2
2.76.4-3
2.76.4-4
2.77.0-1
2.77.1-1
2.77.1-2
2.77.2-1
2.77.3-1
2.78.0-1
2.78.0-2
2.78.1-1
2.78.1-2
2.78.1-3
2.78.1-4
2.78.2-1
2.78.3-1
2.78.3-2
2.78.4-1
2.78.4-2
2.78.4-2.1
2.78.4-3
2.78.4-4
2.78.4-5
2.78.4-6
2.78.4-7
2.79.0+git20240110~g38f5ba3c-1
2.79.0+git20240110~g38f5ba3c-2
2.79.0+git20240119~62ee8bf6-1
2.79.1-1
2.79.1-1.1~exp1
2.79.2-1
2.79.3-1
2.79.3-2
2.79.3-3
2.80.0-1
2.80.0-2
2.80.0-3
2.80.0-4
2.80.0-5
2.80.0-6
2.80.0-7
2.80.0-8
2.80.0-9
2.80.0-10
2.80.1-1
2.80.2-1
2.80.2-2
2.80.3-1
2.80.4-1
2.81.0-1
2.81.1-1
2.81.1-2
2.81.1-3
2.81.2-1
2.82.0-1
2.82.0-2
2.82.1-1
2.82.2-1
2.82.2-2
2.82.2-3
2.82.3-1
2.82.3-2
2.82.4-1
2.82.4-2
2.83.2-1
2.83.2-2
2.83.3-1
2.83.3-2
2.83.4-1
2.83.5-1
2.84.0-1
2.84.0-2
2.84.1-1
2.84.1-2
2.84.1-3
2.84.2-1
2.84.3-1
2.84.4-1
2.84.4-2
2.84.4-3~deb13u1
2.84.4-3~deb13u2
2.84.4-3
2.85.1-1
2.85.1-2
2.85.2-2
2.85.3-1
2.85.4-1
2.86.0-1
2.86.0-2
2.86.0-3
2.86.0-4
2.86.0-5
2.86.0-6
2.86.0-7
2.86.1-1
2.86.1-2
2.86.2-1
2.86.3-1
2.86.3-2
2.86.3-3
2.86.3-4
2.86.3-5
2.87.1-1
2.87.2-1
2.87.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1485.json"

Debian:13 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.84.3-1
2.84.4-1
2.84.4-2
2.84.4-3~deb13u1
2.84.4-3~deb13u2
2.84.4-3
2.85.1-1
2.85.1-2
2.85.2-2
2.85.3-1
2.85.4-1
2.86.0-1
2.86.0-2
2.86.0-3
2.86.0-4
2.86.0-5
2.86.0-6
2.86.0-7
2.86.1-1
2.86.1-2
2.86.2-1
2.86.3-1
2.86.3-2
2.86.3-3
2.86.3-4
2.86.3-5
2.87.1-1
2.87.2-1
2.87.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1485.json"

Debian:14 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.86.3-5

Affected versions

2.*
2.84.3-1
2.84.4-1
2.84.4-2
2.84.4-3~deb13u1
2.84.4-3~deb13u2
2.84.4-3
2.85.1-1
2.85.1-2
2.85.2-2
2.85.3-1
2.85.4-1
2.86.0-1
2.86.0-2
2.86.0-3
2.86.0-4
2.86.0-5
2.86.0-6
2.86.0-7
2.86.1-1
2.86.1-2
2.86.2-1
2.86.3-1
2.86.3-2
2.86.3-3
2.86.3-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1485.json"