ArchLinux: 201902-19: cairo: arbitrary code execution

    Date18 Feb 2019
    CategoryArchLinux
    685
    Posted ByLinuxSecurity Advisories
    The package cairo before version 1.16.0-2 is vulnerable to arbitrary code execution.
    Arch Linux Security Advisory ASA-201902-19
    ==========================================
    
    Severity: Critical
    Date    : 2019-02-17
    CVE-ID  : CVE-2018-19876
    Package : cairo
    Type    : arbitrary code execution
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-826
    
    Summary
    =======
    
    The package cairo before version 1.16.0-2 is vulnerable to arbitrary
    code execution.
    
    Resolution
    ==========
    
    Upgrade to 1.16.0-2.
    
    # pacman -Syu "cairo>=1.16.0-2"
    
    The problem has been fixed upstream but no release is available yet.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    A memory-corruption issue has been found in cairo versions <= 1.16.0,
    in the cairo_ft_apply_variations() function in cairo-ft-font.c. This
    function frees memory using the wrong free function, leading to memory
    corruption. As cairo is used, among others, by WebKitGTK+, this could
    be triggered by a crafted web content in some cases.
    
    Impact
    ======
    
    A malicious remote user could execute arbitrary code by sending
    specially crafted web content.
    
    References
    ==========
    
    https://seclists.org/oss-sec/2018/q4/205
    https://gitlab.freedesktop.org/cairo/cairo/merge_requests/5
    https://security.archlinux.org/CVE-2018-19876
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote
    17
    radio
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"67","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.