← Back to CVEs
CVE-2026-1489
MEDIUM5.4
Description
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
CVE Details
CVSS v3.1 Score5.4
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published1/27/2026
Last Modified3/19/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-787
References
https://access.redhat.com/security/cve/CVE-2026-1489(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2433348(secalert@redhat.com)
https://gitlab.gnome.org/GNOME/glib/-/issues/3872(secalert@redhat.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.