from Secunia Advisory: ------------------------- Description A vulnerability has been reported in Pango, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. The vulnerability is caused due to the "hb_buffer_ensure()" function in pango/opentype/hb-buffer.c not properly checking the return value of memory reallocation operations, which can be exploited to cause the use of an incorrect base address when trying to access the buffer in subsequent functions. The vulnerability is reported in version 1.28.3. Other versions may also be affected. Solution Do not use applications using the library. Provided and/or discovered by Red Hat credits the Mozilla Security Team. Original Advisory Mozilla Bug #606997: https://bugzilla.mozilla.org/show_bug.cgi?id=606997 Red Hat Bug #678563: https://bugzilla.redhat.com/show_bug.cgi?id=678563 Reproducible: Always
Created attachment 265043 [details, diff] patch for the issue
*** This bug has been marked as a duplicate of bug 357067 ***