Bug#933860: pango1.0: CVE-2019-1010238

Salvatore Bonaccorso carnil at debian.org
Sun Aug 4 14:53:28 BST 2019


Source: pango1.0
Version: 1.42.4-6
Severity: important
Tags: security upstream
Forwarded: https://gitlab.gnome.org/GNOME/pango/issues/342

Hi,

The following vulnerability was published for pango1.0.

CVE-2019-1010238[0]:
| Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact
| is: The heap based buffer overflow can be used to get code execution.
| The component is: function name: pango_log2vis_get_embedding_levels,
| assignment of nchars and the loop condition. The attack vector is: Bug
| can be used when application pass invalid utf-8 strings to functions
| like pango_itemize.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-1010238
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010238
[1] https://gitlab.gnome.org/GNOME/pango/issues/342
[2] https://gitlab.gnome.org/GNOME/pango/commit/490f8979a260c16b1df055eab386345da18a2d54

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the pkg-gnome-maintainers mailing list