DSA-1747-1 glib2.0 -- integer overflowID: oval:org.secpod.oval:def:600372 | Date: (C)2011-05-13 (M)2023-02-20 |
Class: PATCH | Family: unix |
Diego Petten discovered that glib2.0, the GLib library of C routines, handles large strings insecurely via its Base64 encoding functions. This could possible lead to the execution of arbitrary code. For the stable distribution , this problem has been fixed in version 2.16.6-1+lenny1. For the oldstable distribution , this problem has been fixed in version 2.12.4-2+etch1. For the testing distribution , this problem will be fixed soon. For the unstable distribution , this problem has been fixed in version 2.20.0-1. We recommend that you upgrade your glib2.0 packages.
Platform: |
Debian 5.0 |
Debian 4.0 |