Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Wed, 21 Jan 2026 21:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS). |
| Title | glib: GLib: Denial of Service via Integer Overflow in g_buffered_input_stream_peek() | Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek() |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
|
Fri, 16 Jan 2026 09:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | glib: GLib: Denial of Service via Integer Overflow in g_buffered_input_stream_peek() | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-01-21T14:25:43.521Z
Reserved: 2026-01-15T11:22:52.285Z
Link: CVE-2026-0988
No data.
Status : Received
Published: 2026-01-21T12:15:55.560
Modified: 2026-01-21T12:15:55.560
Link: CVE-2026-0988
OpenCVE Enrichment
No data.