Mandriva Linux Security Advisory : pango (MDVSA-2010:121)

medium Nessus Plugin ID 47115


New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 4.4


The remote Mandriva Linux host is missing one or more security updates.


A vulnerability has been discovered and corrected in pango :

Array index error in the hb_ot_layout_build_glyph_classes function in pango/opentype/ in Pango before 1.27.1 allows context-dependent attackers to cause a denial of service (application crash) via a crafted font file, related to building a synthetic Glyph Definition (aka GDEF) table by using this font's charmap and the Unicode property database (CVE-2010-0421).

Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: 90

The updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 47115

File Name: mandriva_MDVSA-2010-121.nasl

Version: 1.12

Type: local

Published: 6/23/2010

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: Medium

VPR Score: 4.4

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Temporal Vector: E:U/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64pango1.0-devel, p-cpe:/a:mandriva:linux:lib64pango1.0_0, p-cpe:/a:mandriva:linux:lib64pango1.0_0-modules, p-cpe:/a:mandriva:linux:libpango1.0-devel, p-cpe:/a:mandriva:linux:libpango1.0_0, p-cpe:/a:mandriva:linux:libpango1.0_0-modules, p-cpe:/a:mandriva:linux:pango, p-cpe:/a:mandriva:linux:pango-doc, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2009.1, cpe:/o:mandriva:linux:2010.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 6/22/2010

Reference Information

CVE: CVE-2010-0421

BID: 38760

MDVSA: 2010:121