|Category:||CentOS Local Security Checks|
|Title:||CentOS Update for pango CESA-2010:0140 centos5 i386|
|Summary:||The remote host is missing an update for the 'pango'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'pango'
package(s) announced via the referenced advisory.
Pango is a library used for the layout and rendering of internationalized
An input sanitization flaw, leading to an array index error, was found in
the way the Pango font rendering library synthesized the Glyph Definition
(GDEF) table from a font's character map and the Unicode property database.
If an attacker created a specially-crafted font file and tricked a local,
unsuspecting user into loading the font file in an application that uses
the Pango font rendering library, it could cause that application to crash.
Users of pango and evolution28-pango are advised to upgrade to these
updated packages, which contain a backported patch to resolve this issue.
After installing this update, you must restart your system or restart your
X session for this update to take effect.
pango on CentOS 5
Please install the updated packages.
Common Vulnerability Exposure (CVE) ID: CVE-2010-0421|
BugTraq ID: 38760
Debian Security Information: DSA-2019 (Google Search)
SuSE Security Announcement: SUSE-SR:2010:009 (Google Search)
SuSE Security Announcement: SUSE-SR:2010:012 (Google Search)
SuSE Security Announcement: SUSE-SR:2010:013 (Google Search)
|Copyright||Copyright (c) 2011 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.