Description
A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
Published: 2026-01-21
Score: 3.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The flaw exists in the glib library’s g_buffered_input_stream_peek() function, which does not validate the offset and count parameters supplied to it. A crafted combination of these values can trigger an integer overflow during the length calculation, resulting in an incorrect size being passed to memcpy(). The resulting buffer overflow causes the application to crash, thereby denying service to legitimate users.

Affected Systems

Red Hat Enterprise Linux releases 6, 7, 8, 9, 10 and Red Hat Hardened Images that ship glib are affected. The vulnerability applies to any instance of the glib library used by applications on these platforms, regardless of the exact glib version, until the Red Hat‑issued patch is installed.

Risk and Exploitability

The CVSS score of 3.7 indicates moderate severity, while the EPSS score of <1% indicates a low likelihood of exploitation at present. The issue is not listed in the CISA KEV catalog. Exploitation requires an attacker to supply malicious offset and count values to g_buffered_input_stream_peek(). The description does not detail the exact interface, so based on the description it is inferred that the attack could occur if the application accepts untrusted input—such as from a network connection, file, or user data—under that function. In the absence of a public workaround, mitigation hinges on applying the vendor patch or modifying the application code.

Generated by OpenCVE AI on April 15, 2026 at 15:51 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.


OpenCVE Recommended Actions

  • Upgrade glib to the patched version released by Red Hat for CVE‑2026‑0988.
  • Modify or replace any application code that calls g_buffered_input_stream_peek(), adding bounds checking for offset and count or eliminating that call until the patch is applied.
  • Deploy monitoring for unexpected crashes and, as a temporary defensive measure, limit exposure of the vulnerable function to untrusted input through input validation or firewall rules.

Generated by OpenCVE AI on April 15, 2026 at 15:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4491-1 glib2.0 security update
Ubuntu USN Ubuntu USN USN-7971-1 GLib vulnerability
History

Fri, 24 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
References

Mon, 13 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat hummingbird
CPEs cpe:/a:redhat:hummingbird:1
Vendors & Products Redhat hummingbird

Thu, 19 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
References

Wed, 21 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
Title glib: GLib: Denial of Service via Integer Overflow in g_buffered_input_stream_peek() Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References

Fri, 16 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title glib: GLib: Denial of Service via Integer Overflow in g_buffered_input_stream_peek()
Weaknesses CWE-190
References
Metrics threat_severity

None

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}

threat_severity

Low


Subscriptions

Redhat Enterprise Linux Hummingbird
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-24T20:38:24.202Z

Reserved: 2026-01-15T11:22:52.285Z

Link: CVE-2026-0988

cve-icon Vulnrichment

Updated: 2026-01-21T14:25:39.720Z

cve-icon NVD

Status : Deferred

Published: 2026-01-21T12:15:55.560

Modified: 2026-04-24T21:16:17.357

Link: CVE-2026-0988

cve-icon Redhat

Severity : Low

Publid Date: 2026-01-15T00:00:00Z

Links: CVE-2026-0988 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:00:15Z

Weaknesses