drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in pango
Name: |
Pufferüberlauf in pango |
|
ID: |
FEDORA-2019-547be4a683 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 30 |
|
Datum: |
Mi, 21. August 2019, 07:24 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010238 |
|
Applikationen: |
Pango |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2019-547be4a683 2019-08-21 01:04:08.842400 ------------------------------------------------------------------------------- -
Name : pango Product : Fedora 30 Version : 1.43.0 Release : 4.fc30 URL : http://www.pango.org Summary : System for layout and rendering of internationalized text Description : Pango is a library for laying out and rendering of text, with an emphasis on internationalization. Pango can be used anywhere that text layout is needed, though most of the work on Pango so far has been done in the context of the GTK+ widget toolkit. Pango forms the core of text and font handling for GTK+.
Pango is designed to be modular; the core Pango layout engine can be used with different font backends.
The integration of Pango with Cairo provides a complete solution with high quality text handling and graphics rendering.
------------------------------------------------------------------------------- - Update Information:
Security fix for CVE-2019-1010238 ------------------------------------------------------------------------------- - ChangeLog:
* Wed Aug 14 2019 Peng Wu <pwu@redhat.com> - 1.43.0-4 - Fixes bidi crash - Security fix for CVE-2019-1010238 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1737785 - CVE-2019-1010238 pango: pango_log2vis_get_embedding_levels() heap based buffer overflow https://bugzilla.redhat.com/show_bug.cgi?id=1737785 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2019-547be4a683' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
|
|
|
|