Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2011:1326
The remote host is missing updates announced in
advisory RHSA-2011:1326.

Pango is a library used for the layout and rendering of internationalized

A buffer overflow flaw was found in HarfBuzz, an OpenType text shaping
engine used in Pango. If a user loaded a specially-crafted font file with
an application that uses Pango, it could cause the application to crash or,
possibly, execute arbitrary code with the privileges of the user running
the application. (CVE-2011-3193)

Users of pango are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing this
update, you must restart your system or restart the X server for the update
to take effect.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : Medium

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-3193
BugTraq ID: 49723
RedHat Security Advisories: RHSA-2011:1323
RedHat Security Advisories: RHSA-2011:1324
RedHat Security Advisories: RHSA-2011:1325
RedHat Security Advisories: RHSA-2011:1326
RedHat Security Advisories: RHSA-2011:1327
RedHat Security Advisories: RHSA-2011:1328
SuSE Security Announcement: SUSE-SU-2011:1113 (Google Search)
SuSE Security Announcement: openSUSE-SU-2011:1119 (Google Search)
SuSE Security Announcement: openSUSE-SU-2011:1120 (Google Search)
XForce ISS Database: pango-harfbuzz-bo(69991)
CopyrightCopyright (c) 2011 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.