pixman (0.30.2-1ubuntu0.0.0.0.4) precise-security; urgency=medium

  [ Marc Deslauriers ]
  * SECURITY UPDATE: general_composite_rect() integer overflow
    - debian/patches/CVE-2015-5297-pre1.patch: ensure that iter buffers are
      aligned to 16 bytes in pixman/pixman-general.c,
      pixman/pixman-private.h, pixman/pixman-utils.c.
    - debian/patches/CVE-2015-5297-pre2.patch: use floating point combiners
      for all operators that involve divisions in pixman/pixman-general.c.
    - debian/patches/CVE-2015-5297-1.patch: fix stack related pointer
      arithmetic overflow in pixman/pixman-general.c.
    - debian/patches/CVE-2015-5297-2.patch: tighten up calculation of
      temporary buffer sizes in pixman/pixman-general.c.
    - debian/patches/disable_test.patch: disable blitters test as the
      correct CRC is unknown.
    - CVE-2015-5297

Date: 2018-12-11 17:50:14.902332+00:00
Changed-By: [email protected] (Leonidas S. Barbosa)
Signed-By: Steve Langasek <[email protected]>
https://launchpad.net/ubuntu/+source/pixman/0.30.2-1ubuntu0.0.0.0.4
Sorry, changesfile not available.
-- 
Precise-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/precise-changes

Reply via email to