CVE-2009-1194 (NVD)

2009-05-11

Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.

Products Pango
Type Numeric Errors (CWE-189)
First patch http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
Relevant file/s ./pango/glyphstring.c (modified, +20, -6)
Links http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
http://secunia.com/advisories/35018
https://launchpad.net/bugs/cve/2009-1194
http://www.redhat.com/support/errata/RHSA-2009-0476.html
http://osvdb.org/54279

pango - Tree: 4de30e5500

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: