Your message dated Mon, 11 May 2009 01:25:02 +1000 with message-id <200905110125.07363.steffen.joe...@skolelinux.de> and subject line pango issue fixed in sid has caused the Debian Bug report #527474, regarding pango1.0: integer overflow in heap allocation size calculations to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 527474: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=527474 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---package: pango severity: grave tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for pango1.0. CVE-2009-1194[0]: |Pango is a library for laying out and rendering text, with an emphasis |on internationalization. Pango suffers from a multiplicative integer |overflow which may lead to a potentially exploitable, heap overflow |depending on the calling conditions. For example, this vulnerability is |remotely reachable in Firefox by creating an overly large |document.location value but only results in a process-terminating, |allocation error (denial of service). | |The affected function is pango_glyph_string_set_size. An overflow check |when doubling the size neglects the overflow possible on the subsequent |allocation: | | string->glyphs = g_realloc (string->glyphs, string->space * | sizeof (PangoGlyphInfo)); | |Note that other font rendering subsystems suffer from similar issues and |should be cross-checked by maintainers. Please coordinate with the security team (t...@security.debian.org) to prepare updates for the stable releases. See also see USN-773-1 [1]. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1194 http://security-tracker.debian.net/tracker/CVE-2009-1194 [1] http://www.ubuntu.com/usn/USN-773-1
--- End Message ---
--- Begin Message ---Version: 1.24.0-2 The bug has been fixed upstream and the fix made it into sid/squeeze. Cheers Steffensignature.asc
Description: This is a digitally signed message part.
--- End Message ---