MDVSA-2009:158-3 -- Mandriva pango
|ID: oval:org.secpod.oval:def:300710||Date: (C)2012-01-07 (M)2017-10-04|
|Class: PATCH||Family: unix|
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow. This update corrects the issue. Update: Packages for 2008.0 are being provided due to extended support for Corporate products.
|Mandriva Linux 2008.0|