Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5276-1

Debian Linux Security Advisory 5276-1 - Maddie Stone reported a heap-based buffer overflow flaw in pixman, a pixel-manipulation library for X and cairo, which could result in denial of service or potentially the execution of arbitrary code.

Packet Storm
#linux#debian#dos#buffer_overflow
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5276-1                   [email protected]://www.debian.org/security/                     Salvatore BonaccorsoNovember 12, 2022                     https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : pixmanCVE ID         : CVE-2022-44638Debian Bug     : 1023427Maddie Stone reported a heap-based buffer overflow flaw in pixman, apixel-manipulation library for X and cairo, which could result in denialof service or potentially the execution of arbitrary code.For the stable distribution (bullseye), this problem has been fixed inversion 0.40.0-1.1~deb11u1.We recommend that you upgrade your pixman packages.For the detailed security status of pixman please refer to its securitytracker page at:https://security-tracker.debian.org/tracker/pixmanFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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0y3/-----END PGP SIGNATURE-----

Related news

Gentoo Linux Security Advisory 202407-04

Gentoo Linux Security Advisory 202407-4 - A vulnerability has been discovered in Pixman, which can lead to a heap buffer overflow. Versions greater than or equal to 0.42.2 are affected.

Red Hat Security Advisory 2024-2525-03

Red Hat Security Advisory 2024-2525-03 - An update for mingw-pixman is now available for Red Hat Enterprise Linux 9. Issues addressed include integer overflow and out of bounds write vulnerabilities.

Red Hat Security Advisory 2023-7531-01

Red Hat Security Advisory 2023-7531-01 - An update for pixman is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include integer overflow and out of bounds write vulnerabilities.

CVE-2023-0036: en/security-disclosure/2023/2023-01.md · OpenHarmony/security - Gitee.com

platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.

Ubuntu Security Notice USN-5718-2

Ubuntu Security Notice 5718-2 - USN-5718-1 fixed a vulnerability in pixman. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Maddie Stone discovered that pixman incorrectly handled certain memory operations. A remote attacker could use this issue to cause pixman to crash, resulting in a denial of service, or possibly execute arbitrary code.

Ubuntu Security Notice USN-5718-1

Ubuntu Security Notice 5718-1 - Maddie Stone discovered that pixman incorrectly handled certain memory operations. A remote attacker could use this issue to cause pixman to crash, resulting in a denial of service, or possibly execute arbitrary code.

CVE-2022-44638: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write (#63) · Issues · Pixman / pixman · GitLab

In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.

Packet Storm: Latest News

TOR Virtual Network Tunneling Tool 0.4.8.13