Your message dated Mon, 11 May 2009 01:25:02 +1000
with message-id <200905110125.07363.steffen.joe...@skolelinux.de>
and subject line pango issue fixed in sid
has caused the Debian Bug report #527474,
regarding pango1.0: integer overflow in heap allocation size calculations
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
527474: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=527474
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
package: pango
severity: grave
tags: security

Hi,

The following CVE (Common Vulnerabilities & Exposures) id was
published for pango1.0.

CVE-2009-1194[0]:
|Pango is a library for laying out and rendering text, with an emphasis
|on internationalization.  Pango suffers from a multiplicative integer
|overflow which may lead to a potentially exploitable, heap overflow
|depending on the calling conditions.  For example, this vulnerability is
|remotely reachable in Firefox by creating an overly large
|document.location value but only results in a process-terminating,
|allocation error (denial of service).
|
|The affected function is pango_glyph_string_set_size. An overflow check
|when doubling the size neglects the overflow possible on the subsequent
|allocation:
|
|  string->glyphs = g_realloc (string->glyphs, string->space *
|                              sizeof (PangoGlyphInfo));
|
|Note that other font rendering subsystems suffer from similar issues and
|should be cross-checked by maintainers.

Please coordinate with the security team (t...@security.debian.org)
to prepare updates for the stable releases.

See also see USN-773-1 [1].

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1194
    http://security-tracker.debian.net/tracker/CVE-2009-1194
[1] http://www.ubuntu.com/usn/USN-773-1



--- End Message ---
--- Begin Message ---
Version: 1.24.0-2

The bug has been fixed upstream and the fix made it into sid/squeeze.

Cheers
Steffen

Attachment: signature.asc
Description: This is a digitally signed message part.


--- End Message ---

Reply via email to