Mandriva Linux Security Advisory 2009-158 – Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow. This update corrects the issue. Packages for 2008.0 are being provided due to extended support for Corporate products.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/83430/MDVSA-2009-158-3.txt
Source: https://packetstormsecurity.com/files/83430/Mandriva-Linux-Security-Advisory-2009-158.html

