Описание
ELSA-2013-0687: pixman security update (MODERATE)
[0.26.2-5]
- Fix bug 914474 (CVE 2013-1591)
- Remove openmp.patch
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
pixman
0.26.2-5.el6_4
pixman-devel
0.26.2-5.el6_4
Oracle Linux i686
pixman
0.26.2-5.el6_4
pixman-devel
0.26.2-5.el6_4
Связанные CVE
Связанные уязвимости
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
Stack-based buffer overflow in libpixman, as used in Pale Moon before ...
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.