Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in pixman (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in pixman (Aktualisierung)
ID: USN-3843-2
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 ESM
Datum: Di, 11. Dezember 2018, 23:31
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5297
Applikationen: Pixman
Update von: Ausführen beliebiger Kommandos in pixman

Originalnachricht


--===============3725215869670237432==
Content-Type: multipart/signed; micalg="pgp-sha256";
protocol="application/pgp-signature";
boundary="=-4X97d79cAiRJlOFYxfvu"


--=-4X97d79cAiRJlOFYxfvu
Content-Type: text/plain; charset="UTF-8
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3843-2
December 11, 2018

pixman vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

pixman could be made to crash or run programs if it processed specially
crafted instructions.

Software Description:
- pixman: pixel-manipulation library for X and cairo

Details:

USN-3843-1 fixed a vulnerability in pixman. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

It was discovered that pixman incorrectly handled the
general_composite_rect function. A remote attacker could use this
issue to cause pixman to crash, resulting in a denial of service, or
possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
libpixman-1-0 0.30.2-1ubuntu0.0.0.0.4

After a standard system update you need to restart your session to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3843-2
https://usn.ubuntu.com/usn/usn-3843-1
CVE-2015-5297
--=-4X97d79cAiRJlOFYxfvu
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=hvnd
-----END PGP SIGNATURE-----

--=-4X97d79cAiRJlOFYxfvu--



--===============3725215869670237432==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============3725215869670237432==--
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung