Numeric Errors Affecting pixman package, versions <0.26.0-4
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN12-PIXMAN-1557116
- published 31 Jan 2013
- disclosed 31 Jan 2013
Introduced: 31 Jan 2013
CVE-2013-1591 Open this link in a new tabHow to fix?
Upgrade Debian:12
pixman
to version 0.26.0-4 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream pixman
package and not the pixman
package as distributed by Debian
.
See How to fix?
for Debian:12
relevant fixed versions and status.
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
References
- https://security-tracker.debian.org/tracker/CVE-2013-1591
- https://support.f5.com/csp/article/K51392553
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077
- http://www.palemoon.org/releasenotes-ng.shtml
- http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f
- https://bugzilla.redhat.com/show_bug.cgi?id=910149
- http://rhn.redhat.com/errata/RHSA-2013-0687.html
- http://rhn.redhat.com/errata/RHSA-2013-0746.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:116