First published: Tue Aug 06 2019(Updated: )
Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize. External References: <a href="https://packetstormsecurity.com/files/153838/USN-4081-1.txt">https://packetstormsecurity.com/files/153838/USN-4081-1.txt</a> <a href="https://gitlab.gnome.org/GNOME/pango/issues/342">https://gitlab.gnome.org/GNOME/pango/issues/342</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Pango | >=1.42 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1737785 is critical due to its potential for heap-based buffer overflow leading to code execution.
To fix REDHAT-BUG-1737785, it is recommended to update Gnome Pango to the latest patched version that addresses this vulnerability.
Gnome Pango version 1.42 and later are affected by REDHAT-BUG-1737785.
REDHAT-BUG-1737785 is classified as a buffer overflow vulnerability.
The component affected by REDHAT-BUG-1737785 is the function pango_log2vis_get_embedding_levels.