Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Tech ARP] Mobile CPU Comparison Guide Rev. 12.6

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA512

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-3525-1 security ( -at -) debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

March 22, 2016 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : pixman

CVE ID : CVE-2014-9766

 

Vincent LE GARREC discovered an integer overflow in pixman, a

pixel-manipulation library for X and cairo. A remote attacker can

exploit this flaw to cause an application using the pixman library to

crash, or potentially, to execute arbitrary code with the privileges of

the user running the application.

 

For the oldstable distribution (wheezy), this problem has been fixed

in version 0.26.0-4+deb7u2.

 

For the stable distribution (jessie), the testing distribution (stretch)

and the unstable distribution (sid), this problem was already fixed in

version 0.32.6-1.

 

We recommend that you upgrade your pixman packages.

 

Further information about Debian Security Advisories, how to apply

these updates to your system and frequently asked questions can be

found at: https://www.debian.org/security/

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×