CWE
119 787
Advisory Published
CVE Published
Updated

CVE-2019-1010238: Buffer Overflow

First published: Fri Jul 19 2019(Updated: )

Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize.

Credit: josh@bress.net

Affected SoftwareAffected VersionHow to fix
ubuntu/pango1.0<1.42.4-6ubuntu0.1
1.42.4-6ubuntu0.1
debian/pango1.0
1.46.2-3
1.50.12+ds-1
1.54.0+ds-1
Pango>=1.42.0<=1.44
Oracle SD-WAN Edge=7.3
Oracle SD-WAN Edge=8.0
Oracle SD-WAN Edge=8.1
Oracle SD-WAN Edge=8.2
Red Hat Fedora=29
Red Hat Fedora=30
Debian Linux=10.0
Ubuntu=19.04
Red Hat OpenShift Container Platform=3.11
Red Hat OpenShift Container Platform=4.1
Red Hat Enterprise Linux=8.0
Red Hat Enterprise Linux Desktop=7.0
Red Hat Enterprise Linux Server EUS=7.4
Red Hat Enterprise Linux Server EUS=7.6
Red Hat Enterprise Linux Server EUS=8.1
Red Hat Enterprise Linux Server EUS=8.2
Red Hat Enterprise Linux Server EUS=8.4
Red Hat Enterprise Linux Server=7.0
Red Hat Enterprise Linux Server=7.6
Red Hat Enterprise Linux Server=7.7
Red Hat Enterprise Linux Server=8.2
Red Hat Enterprise Linux Server=8.4
Red Hat Enterprise Linux Server=7.6
Red Hat Enterprise Linux Server=7.7
Red Hat Enterprise Linux Server=8.2
Red Hat Enterprise Linux Server=8.4
Red Hat Enterprise Linux Workstation=7.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the vulnerability ID?

    The vulnerability ID is CVE-2019-1010238.

  • What is the severity of CVE-2019-1010238?

    The severity of CVE-2019-1010238 is critical with a severity value of 9.8.

  • What is the impact of CVE-2019-1010238?

    The impact of CVE-2019-1010238 is a heap based buffer overflow that can be used to get code execution.

  • Which software is affected by CVE-2019-1010238?

    Gnome Pango 1.42 and later, Oracle SD-WAN Edge, Fedoraproject Fedora, Debian Debian Linux, Canonical Ubuntu Linux, Redhat Openshift Container Platform, Redhat Enterprise Linux, and Redhat Enterprise Linux Server are affected by CVE-2019-1010238.

  • How do I fix CVE-2019-1010238?

    To fix CVE-2019-1010238, update the affected software to version 1.42.4-6ubuntu0.1 or apply the recommended patches.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203