[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111543

 
 

909

 
 

86957

 
 

136

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1798-1 pango1.0 -- integer overflow

ID: oval:org.secpod.oval:def:600440Date: (C)2011-05-13   (M)2018-06-20
Class: PATCHFamily: unix




Will Drewry discovered that pango, a system for layout and rendering of internationalized text, is prone to an integer overflow via long glyphstrings. This could cause the execution of arbitrary code when displaying crafted data through an application using the pango library. For the stable distribution , this problem has been fixed in version 1.20.5-3+lenny1. For the oldstable distribution , this problem has been fixed in version 1.14.8-5+etch1. For the testing distribution and the unstable distribution , this problem has been fixed in version 1.24-1. We recommend that you upgrade your pango1.0 packages.

Platform:
Debian 5.0
Debian 4.0
Product:
pango1.0
Reference:
DSA-1798-1
CVE-2009-1194
CVE    1
CVE-2009-1194
CPE    2
cpe:/o:debian:debian_linux:4.x
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies