{"id":"DEBIAN-CVE-2026-1485","details":"A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.","modified":"2026-03-17T02:52:33.376034Z","published":"2026-01-27T14:15:56.223Z","upstream":["CVE-2026-1485"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2026-1485"}],"affected":[{"package":{"name":"glib2.0","ecosystem":"Debian:11","purl":"pkg:deb/debian/glib2.0?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.66.8-1+deb11u8"}]}],"versions":["2.66.8-1","2.66.8-1+deb11u1","2.66.8-1+deb11u2","2.66.8-1+deb11u3","2.66.8-1+deb11u4","2.66.8-1+deb11u5","2.66.8-1+deb11u6","2.66.8-1+deb11u7"],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1485.json"}},{"package":{"name":"glib2.0","ecosystem":"Debian:12","purl":"pkg:deb/debian/glib2.0?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.74.6-2","2.74.6-2+deb12u1","2.74.6-2+deb12u2","2.74.6-2+deb12u3","2.74.6-2+deb12u4","2.74.6-2+deb12u5","2.74.6-2+deb12u6","2.74.6-2+deb12u7","2.74.6-2+deb12u8","2.75.0-1","2.75.2-1","2.75.3-1","2.75.3-2","2.75.3-3","2.75.4-1","2.76.0-1","2.76.1-1","2.76.2-1","2.76.3-1","2.76.4-1","2.76.4-2","2.76.4-3","2.76.4-4","2.77.0-1","2.77.1-1","2.77.1-2","2.77.2-1","2.77.3-1","2.78.0-1","2.78.0-2","2.78.1-1","2.78.1-2","2.78.1-3","2.78.1-4","2.78.2-1","2.78.3-1","2.78.3-2","2.78.4-1","2.78.4-2","2.78.4-2.1","2.78.4-3","2.78.4-4","2.78.4-5","2.78.4-6","2.78.4-7","2.79.0+git20240110~g38f5ba3c-1","2.79.0+git20240110~g38f5ba3c-2","2.79.0+git20240119~62ee8bf6-1","2.79.1-1","2.79.1-1.1~exp1","2.79.2-1","2.79.3-1","2.79.3-2","2.79.3-3","2.80.0-1","2.80.0-10","2.80.0-2","2.80.0-3","2.80.0-4","2.80.0-5","2.80.0-6","2.80.0-7","2.80.0-8","2.80.0-9","2.80.1-1","2.80.2-1","2.80.2-2","2.80.3-1","2.80.4-1","2.81.0-1","2.81.1-1","2.81.1-2","2.81.1-3","2.81.2-1","2.82.0-1","2.82.0-2","2.82.1-1","2.82.2-1","2.82.2-2","2.82.2-3","2.82.3-1","2.82.3-2","2.82.4-1","2.82.4-2","2.83.2-1","2.83.2-2","2.83.3-1","2.83.3-2","2.83.4-1","2.83.5-1","2.84.0-1","2.84.0-2","2.84.1-1","2.84.1-2","2.84.1-3","2.84.2-1","2.84.3-1","2.84.4-1","2.84.4-2","2.84.4-3","2.84.4-3~deb13u1","2.84.4-3~deb13u2","2.85.1-1","2.85.1-2","2.85.2-2","2.85.3-1","2.85.4-1","2.86.0-1","2.86.0-2","2.86.0-3","2.86.0-4","2.86.0-5","2.86.0-6","2.86.0-7","2.86.1-1","2.86.1-2","2.86.2-1","2.86.3-1","2.86.3-2","2.86.3-3","2.86.3-4","2.86.3-5","2.87.1-1","2.87.2-1","2.87.2-2","2.87.2-3","2.87.3-1","2.87.3~gitlab0-1","2.87.5-1","2.88.0-1"],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1485.json"}},{"package":{"name":"glib2.0","ecosystem":"Debian:13","purl":"pkg:deb/debian/glib2.0?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.84.3-1","2.84.4-1","2.84.4-2","2.84.4-3","2.84.4-3~deb13u1","2.84.4-3~deb13u2","2.85.1-1","2.85.1-2","2.85.2-2","2.85.3-1","2.85.4-1","2.86.0-1","2.86.0-2","2.86.0-3","2.86.0-4","2.86.0-5","2.86.0-6","2.86.0-7","2.86.1-1","2.86.1-2","2.86.2-1","2.86.3-1","2.86.3-2","2.86.3-3","2.86.3-4","2.86.3-5","2.87.1-1","2.87.2-1","2.87.2-2","2.87.2-3","2.87.3-1","2.87.3~gitlab0-1","2.87.5-1","2.88.0-1"],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1485.json"}},{"package":{"name":"glib2.0","ecosystem":"Debian:14","purl":"pkg:deb/debian/glib2.0?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.86.3-5"}]}],"versions":["2.84.3-1","2.84.4-1","2.84.4-2","2.84.4-3","2.84.4-3~deb13u1","2.84.4-3~deb13u2","2.85.1-1","2.85.1-2","2.85.2-2","2.85.3-1","2.85.4-1","2.86.0-1","2.86.0-2","2.86.0-3","2.86.0-4","2.86.0-5","2.86.0-6","2.86.0-7","2.86.1-1","2.86.1-2","2.86.2-1","2.86.3-1","2.86.3-2","2.86.3-3","2.86.3-4"],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-1485.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"}]}