[USN-3843-1] pixman vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”zxeOhmUcQAvw74hgLzQbcGKnkz28Zmlei”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–zxeOhmUcQAvw74hgLzQbcGKnkz28Zmlei

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: “ubuntu-security-announce@lists.ubuntu.com”

Message-ID:
Subject: [USN-3843-1] pixman vulnerability

–u8jetZogUJEPpAUItflSZFAQ8B6dw5OcH

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3843-1
December 11, 2018

pixman vulnerability
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

pixman could be made to crash or run programs if it processed specially
crafted instructions.

Software Description:
– pixman: pixel-manipulation library for X and cairo

Details:

It was discovered that pixman incorrectly handled the general_composite_r=
ect
function. A remote attacker could use this issue to cause pixman to crash=
,
resulting in a denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
libpixman-1-0 0.30.2-2ubuntu1.2

After a standard system update you need to restart your session to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3843-1
CVE-2015-5297

Package Information:
https://launchpad.net/ubuntu/+source/pixman/0.30.2-2ubuntu1.2

–u8jetZogUJEPpAUItflSZFAQ8B6dw5OcH–

–zxeOhmUcQAvw74hgLzQbcGKnkz28Zmlei

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlwQA6sACgkQZWnYVadE
vpM2Jg//dCcvw26rXedps2EyVIp7TpPvu34rWQoCeEPgtyyJEeyDXqnPwMV2LHIo
BI3XeqznFSGXMJ23KIDJZ7yikpYexPSH1A0JTGzfV7jeCYhnia8AknzQZeu7mPDs
x0uUEKRt35K/alkpMWg4uPTCEKaaUGP6O2EM1n8ZnLWPcRirPYmzxPAFQXKzjGXL
4vSVefZFFttUB+nsdNVsg8oMRSlKd0UGeVqM37HWKlSAWV+G5GKY2WPmjo6xYhlR
QuCmb0R2Gh94ALqZFFz6QoYt+I3DL9CjNPIPKfvVtLKuO6lZabeW9K3+HiAv58nn
DtrZa6TQeaP3GWmS30f/h1XiG8Prl00EuAHWiD5QdnG8ZVyMN9cl3JgNMz0qgNKq
gDqFUGB6Nr4g+g77RI35eRZmuJLMzN+eszry0YlOLkFrfgjBrJA+zwNFsWGRqSkX
NNu3dpXkNnwplh/os3RW1PhEXISNfhFob6tUC3P3mZGrbbLXDkWWujZym3xKYkEN
YxmqrPCRaUYiwg4l/zE0yFJr+nZL8431Q9NeuWnAO9JGSUvomd5N7uImYYTLEoJh
//She9WolyN3IO68T+DtMik5vNYLs3+NUVDY5JvFohCDXTu4e6J77qni0SMVuBMi
wrbaBFba0OrbcC/R5Eul2ROxe846xn9cFd1JYMTrYhovROdYOrU=
=kS/U
—–END PGP SIGNATURE—–

–zxeOhmUcQAvw74hgLzQbcGKnkz28Zmlei–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK