[Forgot Password]
Login  Register Subscribe

24003

 
 

131401

 
 

103942

 
 

909

 
 

84051

 
 

133

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1798-1 pango1.0 -- integer overflow

ID: oval:org.secpod.oval:def:600440Date: (C)2011-05-13   (M)2017-11-27
Class: PATCHFamily: unix




Will Drewry discovered that pango, a system for layout and rendering of internationalized text, is prone to an integer overflow via long glyphstrings. This could cause the execution of arbitrary code when displaying crafted data through an application using the pango library. For the stable distribution , this problem has been fixed in version 1.20.5-3+lenny1. For the oldstable distribution , this problem has been fixed in version 1.14.8-5+etch1. For the testing distribution and the unstable distribution , this problem has been fixed in version 1.24-1. We recommend that you upgrade your pango1.0 packages.

Platform:
Debian 5.0
Debian 4.0
Product:
pango1.0
Reference:
DSA-1798-1
CVE-2009-1194
CVE    1
CVE-2009-1194
CPE    2
cpe:/o:debian:debian_linux:5.x
cpe:/o:debian:debian_linux:4.x

© 2013 SecPod Technologies