Ausführen beliebiger Kommandos in pixman (Aktualisierung)
ID: | USN-3843-2 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 ESM |
Datum: | Di, 11. Dezember 2018, 23:31 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5297 |
Applikationen: | Pixman |
Update von: | Ausführen beliebiger Kommandos in pixman |
Originalnachricht |
|
--===============3725215869670237432== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-4X97d79cAiRJlOFYxfvu" --=-4X97d79cAiRJlOFYxfvu Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-3843-2 December 11, 2018 pixman vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: pixman could be made to crash or run programs if it processed specially crafted instructions. Software Description: - pixman: pixel-manipulation library for X and cairo Details: USN-3843-1 fixed a vulnerability in pixman. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: It was discovered that pixman incorrectly handled the general_composite_rect function. A remote attacker could use this issue to cause pixman to crash, resulting in a denial of service, or possibly execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: libpixman-1-0 0.30.2-1ubuntu0.0.0.0.4 After a standard system update you need to restart your session to make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3843-2 https://usn.ubuntu.com/usn/usn-3843-1 CVE-2015-5297 --=-4X97d79cAiRJlOFYxfvu Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAABCAAGBQJcEAtMAAoJEEW851uECx9piQkQAJg4fSO8HeNglG8sgLANpdD0 GqRspgJvVaSQ20mUIJRLHBXf81FnYjOLmxXnj+RyTO2GL3GeBmgFITWV/c6T+N0P O5ZzVAgOccBnu3ghlPfDUFVEKx8h634dEMd4UndE+KvF/AvjB0sStk1VC0YnDEOV mCeCKkI+RJ1L3MZ4YszOCWeL6PwmiX9juHR6rNII0quOQ9XT3UsFd0kuffPivRFh aEtwmwfu7qijtlRoMNs/YaFCn6Q0v7Y4pe3fNAOaT3ck1Kn1KXV7qZjFtL9lTG4/ s+JZReOEnq41eJsZEErL7xJAqfJ/hX0Ya8guQlr0GxdrsMRHzlRqYDVn98uHpJIW PVLvPt6BSb5P/U+3b4j/5XbDyp2ySbZHMDeUimBGllXDqcT5GRCw0s5CV5J+/9Xf 8wmXcalULJgI6xp9mlaamVWzgl8ewsJAGtGqrN4KLhs+YcU9e5jz/Dnm5M8zTdn4 toE3zQYUX8MmY5MKeRN8Z71kyGyKNj0jhzeyaT3bR87y+xh4zT6HCffbS+/Ov56/ tMzxcHZA1jLtBxXvIvsolegfTbPn5nm5BF9Dd0JI25eSt6XbEx1OoHws/Gw5WrZw VyQ9ZUZKDTLWItqSHqct2cLyXIYE1B3T0QGu6kFZ1xomyJx12gI/p86l1cfB6/z0 Zq+K8urDcwdfyz9nj4aw =hvnd -----END PGP SIGNATURE----- --=-4X97d79cAiRJlOFYxfvu-- --===============3725215869670237432== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============3725215869670237432==-- |