CVE-2015-5297

NameCVE-2015-5297
DescriptionAn integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1587-1, ELA-60-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pixman (PTS)jessie, jessie (lts)0.32.6-3+deb8u2fixed
stretch (lts), stretch0.34.0-1+deb9u1fixed
buster (security), buster, buster (lts)0.36.0-1+deb10u1fixed
bullseye (security), bullseye0.40.0-1.1~deb11u1fixed
bookworm0.42.2-1fixed
sid, trixie0.44.0-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pixmansourcewheezy0.26.0-4+deb7u3ELA-60-1
pixmansourcejessie0.32.6-3+deb8u1DLA-1587-1
pixmansource(unstable)0.33.4-1

Notes

https://bugs.freedesktop.org/show_bug.cgi?id=92027
Patch: https://cgit.freedesktop.org/pixman/patch/?id=204fcd24d9b7e3988b7496e723014f327828751a

Search for package or bug name: Reporting problems