Buffer Underflow vulnerability in GLib’s content type parsing logic. The issue is caused by storing the length of a header line in a signed integer, allowing integer wraparound for extremely large inputs. This leads to pointer underflow and out-of-bounds memory access in parse_header(). Exploitation requires a user to install or process a maliciously crafted treemagic file, limiting the practical impact to local denial of service or application instability.