This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============3994148167434001752==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="zxeOhmUcQAvw74hgLzQbcGKnkz28Zmlei"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--zxeOhmUcQAvw74hgLzQbcGKnkz28Zmlei
Content-Type: multipart/mixed; boundary="u8jetZogUJEPpAUItflSZFAQ8B6dw5OcH";
protected-headers="v1"
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: "ubuntu-security-announce@lists.ubuntu.com"
Message-ID: <6102a53f-aebf-97a0-5395-117dba0d4157@canonical.com>
Subject: [USN-3843-1] pixman vulnerability
--u8jetZogUJEPpAUItflSZFAQ8B6dw5OcH
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable
==========================================================================
Ubuntu Security Notice USN-3843-1
December 11, 2018
pixman vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
pixman could be made to crash or run programs if it processed specially
crafted instructions.
Software Description:
- pixman: pixel-manipulation library for X and cairo
Details:
It was discovered that pixman incorrectly handled the general_composite_rect
function. A remote attacker could use this issue to cause pixman to crash,
resulting in a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libpixman-1-0 0.30.2-2ubuntu1.2
After a standard system update you need to restart your session to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3843-1
CVE-2015-5297
Package Information:
https://launchpad.net/ubuntu/+source/pixman/0.30.2-2ubuntu1.2
--u8jetZogUJEPpAUItflSZFAQ8B6dw5OcH--
--zxeOhmUcQAvw74hgLzQbcGKnkz28Zmlei
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlwQA6sACgkQZWnYVadE
vpM2Jg//dCcvw26rXedps2EyVIp7TpPvu34rWQoCeEPgtyyJEeyDXqnPwMV2LHIo
BI3XeqznFSGXMJ23KIDJZ7yikpYexPSH1A0JTGzfV7jeCYhnia8AknzQZeu7mPDs
x0uUEKRt35K/alkpMWg4uPTCEKaaUGP6O2EM1n8ZnLWPcRirPYmzxPAFQXKzjGXL
4vSVefZFFttUB+nsdNVsg8oMRSlKd0UGeVqM37HWKlSAWV+G5GKY2WPmjo6xYhlR
QuCmb0R2Gh94ALqZFFz6QoYt+I3DL9CjNPIPKfvVtLKuO6lZabeW9K3+HiAv58nn
DtrZa6TQeaP3GWmS30f/h1XiG8Prl00EuAHWiD5QdnG8ZVyMN9cl3JgNMz0qgNKq
gDqFUGB6Nr4g+g77RI35eRZmuJLMzN+eszry0YlOLkFrfgjBrJA+zwNFsWGRqSkX
NNu3dpXkNnwplh/os3RW1PhEXISNfhFob6tUC3P3mZGrbbLXDkWWujZym3xKYkEN
YxmqrPCRaUYiwg4l/zE0yFJr+nZL8431Q9NeuWnAO9JGSUvomd5N7uImYYTLEoJh
//She9WolyN3IO68T+DtMik5vNYLs3+NUVDY5JvFohCDXTu4e6J77qni0SMVuBMi
wrbaBFba0OrbcC/R5Eul2ROxe846xn9cFd1JYMTrYhovROdYOrU=
=kS/U
-----END PGP SIGNATURE-----
--zxeOhmUcQAvw74hgLzQbcGKnkz28Zmlei--
--===============3994148167434001752==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK
--===============3994148167434001752==--
|