You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa pixman

Sigurnosni nedostatak programskog paketa pixman

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3843-1
December 11, 2018

pixman vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

pixman could be made to crash or run programs if it processed specially
crafted instructions.

Software Description:
– pixman: pixel-manipulation library for X and cairo

Details:

It was discovered that pixman incorrectly handled the general_composite_rect
function. A remote attacker could use this issue to cause pixman to crash,
resulting in a denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
libpixman-1-0 0.30.2-2ubuntu1.2

After a standard system update you need to restart your session to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3843-1
CVE-2015-5297

Package Information:
https://launchpad.net/ubuntu/+source/pixman/0.30.2-2ubuntu1.2

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlwQA6sACgkQZWnYVadE
vpM2Jg//dCcvw26rXedps2EyVIp7TpPvu34rWQoCeEPgtyyJEeyDXqnPwMV2LHIo
BI3XeqznFSGXMJ23KIDJZ7yikpYexPSH1A0JTGzfV7jeCYhnia8AknzQZeu7mPDs
x0uUEKRt35K/alkpMWg4uPTCEKaaUGP6O2EM1n8ZnLWPcRirPYmzxPAFQXKzjGXL
4vSVefZFFttUB+nsdNVsg8oMRSlKd0UGeVqM37HWKlSAWV+G5GKY2WPmjo6xYhlR
QuCmb0R2Gh94ALqZFFz6QoYt+I3DL9CjNPIPKfvVtLKuO6lZabeW9K3+HiAv58nn
DtrZa6TQeaP3GWmS30f/h1XiG8Prl00EuAHWiD5QdnG8ZVyMN9cl3JgNMz0qgNKq
gDqFUGB6Nr4g+g77RI35eRZmuJLMzN+eszry0YlOLkFrfgjBrJA+zwNFsWGRqSkX
NNu3dpXkNnwplh/os3RW1PhEXISNfhFob6tUC3P3mZGrbbLXDkWWujZym3xKYkEN
YxmqrPCRaUYiwg4l/zE0yFJr+nZL8431Q9NeuWnAO9JGSUvomd5N7uImYYTLEoJh
//She9WolyN3IO68T+DtMik5vNYLs3+NUVDY5JvFohCDXTu4e6J77qni0SMVuBMi
wrbaBFba0OrbcC/R5Eul2ROxe846xn9cFd1JYMTrYhovROdYOrU=
=kS/U
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3843-2
December 11, 2018

pixman vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

pixman could be made to crash or run programs if it processed specially
crafted instructions.

Software Description:
– pixman: pixel-manipulation library for X and cairo

Details:

USN-3843-1 fixed a vulnerability in pixman. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

 It was discovered that pixman incorrectly handled the
 general_composite_rect function. A remote attacker could use this
 issue to cause pixman to crash, resulting in a denial of service, or  
possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  libpixman-1-0                   0.30.2-1ubuntu0.0.0.0.4

After a standard system update you need to restart your session to make
all the necessary changes.

References:
  https://usn.ubuntu.com/usn/usn-3843-2
  https://usn.ubuntu.com/usn/usn-3843-1
  CVE-2015-5297—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=hvnd
—–END PGP SIGNATURE—–

AutorJosip Papratovic
Cert idNCERT-REF-2018-12-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa poppler

Otkriveni su sigurnosni nedostaci u programskom paketu poppler za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja....

Close