Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-0476

Опубликовано: 08 мая 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-0476: pango security update (IMPORTANT)

[1.14.9-4]

  • Add pango-glyphstring.patch
  • Resolves: #497361

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

pango

1.14.9-5.el5_3

pango-devel

1.14.9-5.el5_3

Oracle Linux i386

pango

1.14.9-5.el5_3

pango-devel

1.14.9-5.el5_3

Связанные CVE

Связанные уязвимости

ubuntu
около 16 лет назад

Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.

redhat
около 16 лет назад

Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.

nvd
около 16 лет назад

Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.

debian
около 16 лет назад

Integer overflow in the pango_glyph_string_set_size function in pango/ ...

github
около 3 лет назад

Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.