USN-738-1 -- glib2.0 vulnerability
|ID: oval:org.secpod.oval:def:700465||Date: (C)2011-05-13 (M)2017-11-27|
|Class: PATCH||Family: unix|
Diego Petten discovered that the Base64 encoding functions in GLib did not properly handle large strings. If a user or automated system were tricked into processing a crafted Base64 string, an attacker could possibly execute arbitrary code with the privileges of the user invoking the program.