Headline
Ubuntu Security Notice USN-5718-1
Ubuntu Security Notice 5718-1 - Maddie Stone discovered that pixman incorrectly handled certain memory operations. A remote attacker could use this issue to cause pixman to crash, resulting in a denial of service, or possibly execute arbitrary code.
==========================================================================
Ubuntu Security Notice USN-5718-1
November 08, 2022
pixman vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
pixman could be made to crash or run programs if it processed specially
crafted input.
Software Description:
- pixman: pixel-manipulation library for X and cairo
Details:
Maddie Stone discovered that pixman incorrectly handled certain memory
operations. A remote attacker could use this issue to cause pixman to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.10:
libpixman-1-0 0.40.0-1ubuntu0.22.10.1
Ubuntu 22.04 LTS:
libpixman-1-0 0.40.0-1ubuntu0.22.04.1
Ubuntu 20.04 LTS:
libpixman-1-0 0.38.4-0ubuntu2.1
Ubuntu 18.04 LTS:
libpixman-1-0 0.34.0-2ubuntu0.1
After a standard system update you need to restart your session to make all
the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5718-1
CVE-2022-44638
Package Information:
https://launchpad.net/ubuntu/+source/pixman/0.40.0-1ubuntu0.22.10.1
https://launchpad.net/ubuntu/+source/pixman/0.40.0-1ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/pixman/0.38.4-0ubuntu2.1
https://launchpad.net/ubuntu/+source/pixman/0.34.0-2ubuntu0.1
Related news
Gentoo Linux Security Advisory 202407-4 - A vulnerability has been discovered in Pixman, which can lead to a heap buffer overflow. Versions greater than or equal to 0.42.2 are affected.
Red Hat Security Advisory 2024-2525-03 - An update for mingw-pixman is now available for Red Hat Enterprise Linux 9. Issues addressed include integer overflow and out of bounds write vulnerabilities.
Red Hat Security Advisory 2023-7531-01 - An update for pixman is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include integer overflow and out of bounds write vulnerabilities.
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
Ubuntu Security Notice 5718-2 - USN-5718-1 fixed a vulnerability in pixman. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Maddie Stone discovered that pixman incorrectly handled certain memory operations. A remote attacker could use this issue to cause pixman to crash, resulting in a denial of service, or possibly execute arbitrary code.
Debian Linux Security Advisory 5276-1 - Maddie Stone reported a heap-based buffer overflow flaw in pixman, a pixel-manipulation library for X and cairo, which could result in denial of service or potentially the execution of arbitrary code.
In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.