|
|
Subscribe / Log in / New account

pango: code execution

Package(s):pango CVE #(s):CVE-2011-0020
Created:January 27, 2011 Updated:April 1, 2011
Description:

From the Pango advisory:

An input sanitization flaw, leading to a heap-based buffer overflow, was found in the way Pango displayed font files when using the FreeType font engine back end. If a user loaded a malformed font file with an application that uses Pango, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0020)

Alerts:
Gentoo 201405-13 pango 2014-05-17
SUSE SUSE-SR:2011:005 hplip, perl, subversion, t1lib, bind, tomcat5, tomcat6, avahi, gimp, aaa_base, build, libtiff, krb5, nbd, clamav, aaa_base, flash-player, pango, openssl, subversion, postgresql, logwatch, libxml2, quagga, fuse, util-linux 2011-04-01
openSUSE openSUSE-SU-2011:0221-1 pango 2011-03-24
Ubuntu USN-1082-1 pango1.0 2011-03-02
Pardus 2011-42 pango pango-docs 2011-02-14
CentOS CESA-2011:0180 pango 2011-02-04
Red Hat RHSA-2011:0180-01 pango 2011-01-27

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds