Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Ubuntu: Cairo regression Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Ubuntu Peter Valchev discovered that Cairo did not correctly decode PNG image data. By tricking a user or automated system into processing a specially crafted PNG with Cairo, a remote attacker could execute arbitrary code with user privileges.
Ubuntu Security Notice USN-550-2          December 10, 2007
libcairo regression

A security issue affects the following Ubuntu releases:

Ubuntu 7.04
Ubuntu 7.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 7.04:
  libcairo2                       1.4.2-0ubuntu1.2

Ubuntu 7.10:
  libcairo2                       1.4.10-1ubuntu4.2

After a standard system upgrade you need to restart your session to effect
the necessary changes.

Details follow:

USN-550-1 fixed vulnerabilities in Cairo.  The upstream fixes were incomplete,
and under certain situations, applications using Cairo would crash with a
floating point error.  This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

 Peter Valchev discovered that Cairo did not correctly decode PNG image data.
 By tricking a user or automated system into processing a specially crafted
 PNG with Cairo, a remote attacker could execute arbitrary code with user

Updated packages for Ubuntu 7.04:

  Source archives:
      Size/MD5:    29170 a64d5accaf670a3a042a0716291394d7
      Size/MD5:      980 f4568de7fd8d8e64448dd1132927061f
      Size/MD5:  3081092 b254633046eafe603776d0bee791b751

  Architecture independent packages:
      Size/MD5:   329056 b1575fd670eb3855e96edf52f3cf7ab0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):
      Size/MD5:   515040 59fc61a32d6c5ca65df42f268268f379
      Size/MD5:   430266 6d63671bf6d432855a177a76cab4f1d0
      Size/MD5:   537122 59f7f0831b4553b99b533958b2a5637d
      Size/MD5:   446134 17a75ebfeaa43eca5075260f7322e604
      Size/MD5:   214084 e25a10d4d4e773a7a6a81e4222116497

  i386 architecture (x86 compatible Intel/AMD):
      Size/MD5:   488790 979721dacfc63ff1e87c97d104355108
      Size/MD5:   420138 074aafcb523bc8b393ff13513ed94f81
      Size/MD5:   508712 6a177d9cffabeb7b46d0b1b1d83408bd
      Size/MD5:   435692 ff8716999c992cde0d53c0a4cd7776fb
      Size/MD5:   204116 519465ff73b0dead2e18ecef8090c41f

  powerpc architecture (Apple Macintosh G3/G4/G5):
      Size/MD5:   498406 cac5ffc403e3d286be56aa4c7dfcac03
      Size/MD5:   422954 313dccc5f8880eb99d2bd520dd6b1981
      Size/MD5:   520498 0c0472153c4b798e2219c3e72643818a
      Size/MD5:   438856 645c36b71f069a29c78e71517ebc9253
      Size/MD5:   206976 d4d191ab373dae4bc9b61b4c72aefef4

  sparc architecture (Sun SPARC/UltraSPARC):
      Size/MD5:   472108 0317c9ca17ab5428f9e1f359cfb2fa06
      Size/MD5:   402336 44be030c98706251b3e414f3e89a9154
      Size/MD5:   492324 634481a6f873ae9c00b8b1a416b4ea7e
      Size/MD5:   417212 f96fd87530823ee7aa2e6870049eb45f
      Size/MD5:   186296 42df2b3d472069e4918a717c964ba7f7

Updated packages for Ubuntu 7.10:

  Source archives:
      Size/MD5:    35820 a5dae2b600de79eb6d6cd7c0df613554
      Size/MD5:     1013 8474af5f122f83ab1f75f9ea3f8d354e
      Size/MD5:  3216689 5598a5e500ad922e37b159dee72fc993

  Architecture independent packages:
      Size/MD5:   407696 c269f047a06167c111ee0a11365cc1ea

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):
      Size/MD5:   572210 a9642cb123ccf6312916e22c27a6e3a9
      Size/MD5:   489124 4924ec45a4eea3a3a275f002415653e2
      Size/MD5:   632822 07662831762f20e50139b5c950731f58
      Size/MD5:   536922 99d1a0202e50db78c0c4646859fea13f
      Size/MD5:   195802 c81baf7740526b9ed2264ab2d5be8bc0

  i386 architecture (x86 compatible Intel/AMD):
      Size/MD5:   546548 529e9341682d12e757d0e5dc686cc6ec
      Size/MD5:   479746 5769a4e61e6422cc12839ff17925de9f
      Size/MD5:   601216 d54be2b3a904bfa20af22b69d8fd21ea
      Size/MD5:   524124 53f686c49d846e1afe5e8f89115fa1d2
      Size/MD5:   186428 c84079451a7bfc3b85c34238aa3c78ce

  powerpc architecture (Apple Macintosh G3/G4/G5):
      Size/MD5:   554832 1de0e3112f48e32b64840429ba621e23
      Size/MD5:   479018 4980ba793084c17f733f40bbf8e4f15e
      Size/MD5:   613880 9a7e834124d8a124f8408ed89f2353da
      Size/MD5:   528508 5ae830818a92c4838fc3951485431530
      Size/MD5:   186266 098d9b7df582a4ecb9bdf77831c4336a

  sparc architecture (Sun SPARC/UltraSPARC):
      Size/MD5:   543772 e1ea0f5cb6745b0272a6c4d4aeb239e3
      Size/MD5:   471248 a8e5991f36e20b71e6213d6c44031e37
      Size/MD5:   584786 affc097d3d1a068fd5fd7f80d13005c0
      Size/MD5:   505364 0a59d599ca6fb9f8047d35745c0d0db3
      Size/MD5:   177688 f2705635217a2476cadc8b6dc5b9eae6

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.