Home

Description

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

PUBLISHED Reserved 2026-01-27 | Published 2026-01-27 | Updated 2026-01-27 | Assigner redhat




LOW: 2.8CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L

Problem types

Out-of-bounds Read

Product status

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2026-01-27:Reported to Red Hat.
2026-01-27:Made public.

Credits

Red Hat would like to thank treeplus for reporting this issue.

References

access.redhat.com/security/cve/CVE-2026-1485 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2433325 (RHBZ#2433325) issue-tracking

cve.org (CVE-2026-1485)

nvd.nist.gov (CVE-2026-1485)

Download JSON