Description
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
Problem types
Product status
Timeline
| 2026-01-27: | Reported to Red Hat. |
| 2026-01-27: | Made public. |
Credits
Red Hat would like to thank treeplus for reporting this issue.
References
access.redhat.com/security/cve/CVE-2026-1489
bugzilla.redhat.com/show_bug.cgi?id=2433348 (RHBZ#2433348)