Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-1326

Опубликовано: 21 сент. 2011
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2011-1326: pango security update (MODERATE)

[1.14.9.8.0.1.el5_7.3]

  • Bump release

[1.14.9.8.el5_1.3]

  • Prevent buffer overflow errors in harfbuzz module (CVE-2011-3193)
  • Resolves: #737819

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

pango

1.14.9-8.0.1.el5_7.3

pango-devel

1.14.9-8.0.1.el5_7.3

Oracle Linux x86_64

pango

1.14.9-8.0.1.el5_7.3

pango-devel

1.14.9-8.0.1.el5_7.3

Oracle Linux i386

pango

1.14.9-8.0.1.el5_7.3

pango-devel

1.14.9-8.0.1.el5_7.3

Связанные CVE

Связанные уязвимости

ubuntu
около 13 лет назад

Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.

redhat
почти 14 лет назад

Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.

nvd
около 13 лет назад

Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.

debian
около 13 лет назад

Heap-based buffer overflow in the Lookup_MarkMarkPos function in the H ...

github
около 3 лет назад

Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.