[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1747-1 glib2.0 -- integer overflow

ID: oval:org.secpod.oval:def:600372Date: (C)2011-05-13   (M)2023-02-20
Class: PATCHFamily: unix




Diego Petten discovered that glib2.0, the GLib library of C routines, handles large strings insecurely via its Base64 encoding functions. This could possible lead to the execution of arbitrary code. For the stable distribution , this problem has been fixed in version 2.16.6-1+lenny1. For the oldstable distribution , this problem has been fixed in version 2.12.4-2+etch1. For the testing distribution , this problem will be fixed soon. For the unstable distribution , this problem has been fixed in version 2.20.0-1. We recommend that you upgrade your glib2.0 packages.

Platform:
Debian 5.0
Debian 4.0
Product:
glib2.0
Reference:
DSA-1747-1
CVE-2008-4316
CVE    1
CVE-2008-4316
CPE    2
cpe:/o:debian:debian_linux:4.x
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies