Multiple integer overflows might allow for the execution of arbitrary code when performing base64 conversion.
Package | dev-libs/glib on all architectures |
---|---|
Affected versions | < 2.18.4-r1 |
Unaffected versions | >= 2.18.4-r1 revision >= 2.16.6-r1 < 2 |
The GLib is a library of C routines that is used by a multitude of programs.
Diego E. Petteno` reported multiple integer overflows in glib/gbase64.c when converting a long string from or to a base64 representation.
A remote attacker could entice a user or automated system to perform a base64 conversion via an application using GLib, possibly resulting in the execution of arbitrary code.
There is no known workaround at this time.
All GLib 2.18 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.18.4-r1"
All GLib 2.16 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.16.6-r1"
Release date
April 03, 2009
Latest revision
April 05, 2009: 02
Severity
normal
Exploitable
remote
Bugzilla entries