Total vulnerabilities in the database
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.
Software | From | Fixed in |
---|---|---|
pango / pango | 1.6 | 1.6.x |
pango / pango | 1.14 | 1.14.x |
pango / pango | 1.16 | 1.16.x |
pango / pango | 1.8 | 1.8.x |
pango / pango | 1.4 | 1.4.x |
pango / pango | - | 1.22.x |
pango / pango | 1.10 | 1.10.x |
pango / pango | 1.2 | 1.2.x |
pango / pango | 1.18 | 1.18.x |
pango / pango | 1.12 | 1.12.x |
pango / pango | 1.20 | 1.20.x |