DEBIAN-CVE-2026-1489

Source
https://security-tracker.debian.org/tracker/CVE-2026-1489
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1489.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-1489
Upstream
  • CVE-2026-1489
Downstream
Published
2026-01-27T15:15:57.370Z
Modified
2026-03-17T02:52:33.214644Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L CVSS Calculator
Summary
[none]
Details

A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.

References

Affected packages

Debian:11 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.66.8-1+deb11u8

Affected versions

2.*
2.66.8-1
2.66.8-1+deb11u1
2.66.8-1+deb11u2
2.66.8-1+deb11u3
2.66.8-1+deb11u4
2.66.8-1+deb11u5
2.66.8-1+deb11u6
2.66.8-1+deb11u7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1489.json"

Debian:12 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.74.6-2
2.74.6-2+deb12u1
2.74.6-2+deb12u2
2.74.6-2+deb12u3
2.74.6-2+deb12u4
2.74.6-2+deb12u5
2.74.6-2+deb12u6
2.74.6-2+deb12u7
2.74.6-2+deb12u8
2.75.0-1
2.75.2-1
2.75.3-1
2.75.3-2
2.75.3-3
2.75.4-1
2.76.0-1
2.76.1-1
2.76.2-1
2.76.3-1
2.76.4-1
2.76.4-2
2.76.4-3
2.76.4-4
2.77.0-1
2.77.1-1
2.77.1-2
2.77.2-1
2.77.3-1
2.78.0-1
2.78.0-2
2.78.1-1
2.78.1-2
2.78.1-3
2.78.1-4
2.78.2-1
2.78.3-1
2.78.3-2
2.78.4-1
2.78.4-2
2.78.4-2.1
2.78.4-3
2.78.4-4
2.78.4-5
2.78.4-6
2.78.4-7
2.79.0+git20240110~g38f5ba3c-1
2.79.0+git20240110~g38f5ba3c-2
2.79.0+git20240119~62ee8bf6-1
2.79.1-1
2.79.1-1.1~exp1
2.79.2-1
2.79.3-1
2.79.3-2
2.79.3-3
2.80.0-1
2.80.0-2
2.80.0-3
2.80.0-4
2.80.0-5
2.80.0-6
2.80.0-7
2.80.0-8
2.80.0-9
2.80.0-10
2.80.1-1
2.80.2-1
2.80.2-2
2.80.3-1
2.80.4-1
2.81.0-1
2.81.1-1
2.81.1-2
2.81.1-3
2.81.2-1
2.82.0-1
2.82.0-2
2.82.1-1
2.82.2-1
2.82.2-2
2.82.2-3
2.82.3-1
2.82.3-2
2.82.4-1
2.82.4-2
2.83.2-1
2.83.2-2
2.83.3-1
2.83.3-2
2.83.4-1
2.83.5-1
2.84.0-1
2.84.0-2
2.84.1-1
2.84.1-2
2.84.1-3
2.84.2-1
2.84.3-1
2.84.4-1
2.84.4-2
2.84.4-3~deb13u1
2.84.4-3~deb13u2
2.84.4-3
2.85.1-1
2.85.1-2
2.85.2-2
2.85.3-1
2.85.4-1
2.86.0-1
2.86.0-2
2.86.0-3
2.86.0-4
2.86.0-5
2.86.0-6
2.86.0-7
2.86.1-1
2.86.1-2
2.86.2-1
2.86.3-1
2.86.3-2
2.86.3-3
2.86.3-4
2.86.3-5
2.87.1-1
2.87.2-1
2.87.2-2
2.87.2-3
2.87.3~gitlab0-1
2.87.3-1
2.87.5-1
2.88.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1489.json"

Debian:13 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.84.3-1
2.84.4-1
2.84.4-2
2.84.4-3~deb13u1
2.84.4-3~deb13u2
2.84.4-3
2.85.1-1
2.85.1-2
2.85.2-2
2.85.3-1
2.85.4-1
2.86.0-1
2.86.0-2
2.86.0-3
2.86.0-4
2.86.0-5
2.86.0-6
2.86.0-7
2.86.1-1
2.86.1-2
2.86.2-1
2.86.3-1
2.86.3-2
2.86.3-3
2.86.3-4
2.86.3-5
2.87.1-1
2.87.2-1
2.87.2-2
2.87.2-3
2.87.3~gitlab0-1
2.87.3-1
2.87.5-1
2.88.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1489.json"

Debian:14 / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/debian/glib2.0?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.86.3-5

Affected versions

2.*
2.84.3-1
2.84.4-1
2.84.4-2
2.84.4-3~deb13u1
2.84.4-3~deb13u2
2.84.4-3
2.85.1-1
2.85.1-2
2.85.2-2
2.85.3-1
2.85.4-1
2.86.0-1
2.86.0-2
2.86.0-3
2.86.0-4
2.86.0-5
2.86.0-6
2.86.0-7
2.86.1-1
2.86.1-2
2.86.2-1
2.86.3-1
2.86.3-2
2.86.3-3
2.86.3-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1489.json"