CVE-2026-1485

low

Description

A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.

References

https://bugzilla.redhat.com/show_bug.cgi?id=2433325

https://access.redhat.com/security/cve/CVE-2026-1485

Details

Source: Mitre, NVD

Published: 2026-01-27

Updated: 2026-01-27

Risk Information

CVSS v2

Base Score: 1.7

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:P

Severity: Low

CVSS v3

Base Score: 2.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L

Severity: Low

EPSS

EPSS: 0.00013