pango is vulnerable to arbitrary code execution. The vulnerability exists as an integer overflow flaw in Pango’s pango_glyph_string_set_size() function. If an attacker is able to pass an arbitrarily long string to Pango, it may be possible to execute arbitrary code with the permissions of the application calling Pango.
github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html
lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html
osvdb.org/54279
secunia.com/advisories/35018
secunia.com/advisories/35021
secunia.com/advisories/35027
secunia.com/advisories/35038
secunia.com/advisories/35685
secunia.com/advisories/35914
secunia.com/advisories/36005
secunia.com/advisories/36145
sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1
www.debian.org/security/2009/dsa-1798
www.mozilla.org/security/announce/2009/mfsa2009-36.html
www.ocert.org/advisories/ocert-2009-001.html
www.openwall.com/lists/oss-security/2009/05/07/1
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2009-0476.html
www.securityfocus.com/archive/1/503349/100/0/threaded
www.securityfocus.com/bid/34870
www.securityfocus.com/bid/35758
www.securitytracker.com/id?1022196
www.ubuntu.com/usn/USN-773-1
www.vupen.com/english/advisories/2009/1269
www.vupen.com/english/advisories/2009/1972
access.redhat.com/errata/RHSA-2009:0476
access.redhat.com/security/cve/CVE-2009-1194
bugzilla.mozilla.org/show_bug.cgi?id=480134
bugzilla.redhat.com/show_bug.cgi?id=496887
exchange.xforce.ibmcloud.com/vulnerabilities/50397
launchpad.net/bugs/cve/2009-1194
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10137