STLport: Possible remote execution of arbitrary code
Gentoo Linux Security Advisory
||GLSA 200703-07 / STLport
||March 06, 2007
||March 06, 2007: 01
All supported architectures
Two buffer overflows have been discovered in STLport possibly leading to
the remote execution of arbitrary code.
STLport is a multi-platform C++ Standard Library implementation.
Two buffer overflows have been discovered, one in "print floats" and
one in the rope constructor.
Both of the buffer overflows could result in the remote execution of
arbitrary code. Please note that the exploitability of the
vulnerabilities depends on how the library is used by other software
There is no known workaround at this time.
All STLport users should upgrade to the latest version.
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/STLport-5.0.3"