Lucene search

K
centosCentOS ProjectCESA-2009:0476
HistoryMay 08, 2009 - 9:06 p.m.

evolution28, pango security update

2009-05-0821:06:55
CentOS Project
lists.centos.org
37

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

72.6%

CentOS Errata and Security Advisory CESA-2009:0476

Pango is a library used for the layout and rendering of internationalized
text.

Will Drewry discovered an integer overflow flaw in Pango’s
pango_glyph_string_set_size() function. If an attacker is able to pass an
arbitrarily long string to Pango, it may be possible to execute arbitrary
code with the permissions of the application calling Pango. (CVE-2009-1194)

pango and evolution28-pango users are advised to upgrade to these updated
packages, which contain a backported patch to resolve this issue. After
installing this update, you must restart your system or restart the X
server for the update to take effect. Note: Restarting the X server closes
all open applications and logs you out of your session.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2009-May/078009.html
https://lists.centos.org/pipermail/centos-announce/2009-May/078010.html
https://lists.centos.org/pipermail/centos-announce/2009-May/078015.html
https://lists.centos.org/pipermail/centos-announce/2009-May/078016.html
https://lists.centos.org/pipermail/centos-announce/2009-May/078022.html
https://lists.centos.org/pipermail/centos-announce/2009-May/078024.html
https://lists.centos.org/pipermail/centos-announce/2009-May/078025.html
https://lists.centos.org/pipermail/centos-announce/2009-May/078026.html
https://lists.centos.org/pipermail/centos-announce/2009-May/078090.html
https://lists.centos.org/pipermail/centos-announce/2009-May/078091.html

Affected packages:
evolution28-pango
evolution28-pango-devel
pango
pango-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2009:0476

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

72.6%