GLib: Execution of arbitrary code Multiple integer overflows might allow for the execution of arbitrary code when performing base64 conversion. glib 2009-04-03 2009-04-05 249214 remote 2.18.4-r1 2.16.6-r1 2 2.18.4-r1

The GLib is a library of C routines that is used by a multitude of programs.

Diego E. Petteno` reported multiple integer overflows in glib/gbase64.c when converting a long string from or to a base64 representation.

A remote attacker could entice a user or automated system to perform a base64 conversion via an application using GLib, possibly resulting in the execution of arbitrary code.

There is no known workaround at this time.

All GLib 2.18 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.18.4-r1"

All GLib 2.16 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.16.6-r1"
CVE-2008-4316 rbu rbu rbu