USN-738-1: GLib vulnerability
16 March 2009
- glib2.0 -
Diego Petteno discovered that the Base64 encoding functions in GLib did not
properly handle large strings. If a user or automated system were tricked
into processing a crafted Base64 string, an attacker could possibly execute
arbitrary code with the privileges of the user invoking the program.
The problem can be corrected by updating your system to the following package versions:
After a standard system upgrade you need to reboot your computer to effect
the necessary changes.