[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1798-1 pango1.0 -- integer overflow

ID: oval:org.secpod.oval:def:600440Date: (C)2011-05-13   (M)2023-02-20
Class: PATCHFamily: unix




Will Drewry discovered that pango, a system for layout and rendering of internationalized text, is prone to an integer overflow via long glyphstrings. This could cause the execution of arbitrary code when displaying crafted data through an application using the pango library. For the stable distribution , this problem has been fixed in version 1.20.5-3+lenny1. For the oldstable distribution , this problem has been fixed in version 1.14.8-5+etch1. For the testing distribution and the unstable distribution , this problem has been fixed in version 1.24-1. We recommend that you upgrade your pango1.0 packages.

Platform:
Debian 5.0
Debian 4.0
Product:
pango1.0
Reference:
DSA-1798-1
CVE-2009-1194
CVE    1
CVE-2009-1194
CPE    2
cpe:/o:debian:debian_linux:4.x
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies