Description
A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
Problem types
Integer Overflow or Wraparound
Product status
Timeline
| 2026-01-15: | Reported to Red Hat. |
| 2026-01-15: | Made public. |
Credits
Red Hat would like to thank Codean Labs for reporting this issue.
References
access.redhat.com/security/cve/CVE-2026-0988
bugzilla.redhat.com/show_bug.cgi?id=2429886 (RHBZ#2429886)