GLib: Execution of arbitrary code — GLSA 200904-02

Multiple integer overflows might allow for the execution of arbitrary code when performing base64 conversion.

Affected packages

dev-libs/glib on all architectures
Affected versions < 2.18.4-r1
Unaffected versions >= 2.18.4-r1
revision >= 2.16.6-r1
< 2

Background

The GLib is a library of C routines that is used by a multitude of programs.

Description

Diego E. Petteno` reported multiple integer overflows in glib/gbase64.c when converting a long string from or to a base64 representation.

Impact

A remote attacker could entice a user or automated system to perform a base64 conversion via an application using GLib, possibly resulting in the execution of arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All GLib 2.18 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.18.4-r1"

All GLib 2.16 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.16.6-r1"

References

Release date
April 03, 2009

Latest revision
April 05, 2009: 02

Severity
normal

Exploitable
remote

Bugzilla entries