[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1798-1 pango1.0 -- integer overflow

ID: oval:org.secpod.oval:def:600440Date: (C)2011-05-13   (M)2017-11-27
Class: PATCHFamily: unix




Will Drewry discovered that pango, a system for layout and rendering of internationalized text, is prone to an integer overflow via long glyphstrings. This could cause the execution of arbitrary code when displaying crafted data through an application using the pango library. For the stable distribution , this problem has been fixed in version 1.20.5-3+lenny1. For the oldstable distribution , this problem has been fixed in version 1.14.8-5+etch1. For the testing distribution and the unstable distribution , this problem has been fixed in version 1.24-1. We recommend that you upgrade your pango1.0 packages.

Platform:
Debian 5.0
Debian 4.0
Product:
pango1.0
Reference:
DSA-1798-1
CVE-2009-1194
CVE    1
CVE-2009-1194
CPE    2
cpe:/o:debian:debian_linux:5.x
cpe:/o:debian:debian_linux:4.x

© 2013 SecPod Technologies