-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.5863
                          pixman security update
                             14 November 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           pixman
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-44638  

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2022/msg00246.html

Comment: CVSS (Max):  8.8 CVE-2022-44638 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: NVD
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5276-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 12, 2022                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : pixman
CVE ID         : CVE-2022-44638
Debian Bug     : 1023427

Maddie Stone reported a heap-based buffer overflow flaw in pixman, a
pixel-manipulation library for X and cairo, which could result in denial
of service or potentially the execution of arbitrary code.

For the stable distribution (bullseye), this problem has been fixed in
version 0.40.0-1.1~deb11u1.

We recommend that you upgrade your pixman packages.

For the detailed security status of pixman please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/pixman

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

- -----BEGIN PGP SIGNATURE-----
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=0y3/
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=JtLA
-----END PGP SIGNATURE-----