Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 16 Sep 2016 15:00:53 +0200
From: Hanno Böck <>
Subject: Out of bounds heap bugs in glib, heap buffer overflow in

By testing GNOME-related packages with Address Sanitizer I recently
discovered several trivial to find bugs.

Two out of bounds bugs in the glib library were uncovered by running
the test suite with Address Sanitizer enabled. One heap buffer overflow
in the parameter parsing of gnome-session was uncovered by trying to
start GNOME. Given that these bugs weren't discovered earlier means
that most likely nobody ever used Address Sanitizer to test GNOME

I strongly recommend to GNOME and to other software communities to use
Address Sanitizer testing in order to improve the quality of their

Out of bounds read in g_unichar_iswide_bsearch() / glib
Upstream bug report (again reported here)
Commit / fix
Fixed in 2.48.2.

Out of bounds read in token_stream_prepare() / glib
Upstream bug report
Commit / fix
Fixed in 2.48.0.

Heap buffer overflow in gnome-session
Upstream bug report
Commit / fix
Fixed in 3.20.2.

Hanno Böck

GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.