-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: cairo and pixman security and bug fix update
Advisory ID:       RHSA-2022:1961-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:1961
Issue date:        2022-05-10
CVE Names:         CVE-2020-35492 
====================================================================
1. Summary:

An update for cairo and pixman is now available for Red Hat Enterprise
Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

Cairo is a 2D graphics library designed to provide high-quality display and
print output.

Pixman is a pixel manipulation library for the X Window System and Cairo.

Security Fix(es):

* cairo: libreoffice slideshow aborts with stack smashing in cairo's
composite_boxes (CVE-2020-35492)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.6 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1898396 - CVE-2020-35492 cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
cairo-1.15.12-6.el8.src.rpm
pixman-0.38.4-2.el8.src.rpm

aarch64:
cairo-1.15.12-6.el8.aarch64.rpm
cairo-debuginfo-1.15.12-6.el8.aarch64.rpm
cairo-debugsource-1.15.12-6.el8.aarch64.rpm
cairo-devel-1.15.12-6.el8.aarch64.rpm
cairo-gobject-1.15.12-6.el8.aarch64.rpm
cairo-gobject-debuginfo-1.15.12-6.el8.aarch64.rpm
cairo-gobject-devel-1.15.12-6.el8.aarch64.rpm
cairo-tools-debuginfo-1.15.12-6.el8.aarch64.rpm
pixman-0.38.4-2.el8.aarch64.rpm
pixman-debuginfo-0.38.4-2.el8.aarch64.rpm
pixman-debugsource-0.38.4-2.el8.aarch64.rpm
pixman-devel-0.38.4-2.el8.aarch64.rpm

ppc64le:
cairo-1.15.12-6.el8.ppc64le.rpm
cairo-debuginfo-1.15.12-6.el8.ppc64le.rpm
cairo-debugsource-1.15.12-6.el8.ppc64le.rpm
cairo-devel-1.15.12-6.el8.ppc64le.rpm
cairo-gobject-1.15.12-6.el8.ppc64le.rpm
cairo-gobject-debuginfo-1.15.12-6.el8.ppc64le.rpm
cairo-gobject-devel-1.15.12-6.el8.ppc64le.rpm
cairo-tools-debuginfo-1.15.12-6.el8.ppc64le.rpm
pixman-0.38.4-2.el8.ppc64le.rpm
pixman-debuginfo-0.38.4-2.el8.ppc64le.rpm
pixman-debugsource-0.38.4-2.el8.ppc64le.rpm
pixman-devel-0.38.4-2.el8.ppc64le.rpm

s390x:
cairo-1.15.12-6.el8.s390x.rpm
cairo-debuginfo-1.15.12-6.el8.s390x.rpm
cairo-debugsource-1.15.12-6.el8.s390x.rpm
cairo-devel-1.15.12-6.el8.s390x.rpm
cairo-gobject-1.15.12-6.el8.s390x.rpm
cairo-gobject-debuginfo-1.15.12-6.el8.s390x.rpm
cairo-gobject-devel-1.15.12-6.el8.s390x.rpm
cairo-tools-debuginfo-1.15.12-6.el8.s390x.rpm
pixman-0.38.4-2.el8.s390x.rpm
pixman-debuginfo-0.38.4-2.el8.s390x.rpm
pixman-debugsource-0.38.4-2.el8.s390x.rpm
pixman-devel-0.38.4-2.el8.s390x.rpm

x86_64:
cairo-1.15.12-6.el8.i686.rpm
cairo-1.15.12-6.el8.x86_64.rpm
cairo-debuginfo-1.15.12-6.el8.i686.rpm
cairo-debuginfo-1.15.12-6.el8.x86_64.rpm
cairo-debugsource-1.15.12-6.el8.i686.rpm
cairo-debugsource-1.15.12-6.el8.x86_64.rpm
cairo-devel-1.15.12-6.el8.i686.rpm
cairo-devel-1.15.12-6.el8.x86_64.rpm
cairo-gobject-1.15.12-6.el8.i686.rpm
cairo-gobject-1.15.12-6.el8.x86_64.rpm
cairo-gobject-debuginfo-1.15.12-6.el8.i686.rpm
cairo-gobject-debuginfo-1.15.12-6.el8.x86_64.rpm
cairo-gobject-devel-1.15.12-6.el8.i686.rpm
cairo-gobject-devel-1.15.12-6.el8.x86_64.rpm
cairo-tools-debuginfo-1.15.12-6.el8.i686.rpm
cairo-tools-debuginfo-1.15.12-6.el8.x86_64.rpm
pixman-0.38.4-2.el8.i686.rpm
pixman-0.38.4-2.el8.x86_64.rpm
pixman-debuginfo-0.38.4-2.el8.i686.rpm
pixman-debuginfo-0.38.4-2.el8.x86_64.rpm
pixman-debugsource-0.38.4-2.el8.i686.rpm
pixman-debugsource-0.38.4-2.el8.x86_64.rpm
pixman-devel-0.38.4-2.el8.i686.rpm
pixman-devel-0.38.4-2.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-35492
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYnqRl9zjgjWX9erEAQiU+xAAlV8fTTU5zLgHcTuHoS/FN7ztcJm+mGU6
hGpbZ3R9sIXDXHMSap+9BAJKMT5Mv2L6F5SwYiXdAUMMfDmWT2HOWzRxuER++cRh
xr0ST/ihwVfwFCiabrluxIwDj4B9LDqVaPs2Q0AJdI4d8fYevXJYxA9KInJ8xO89
5uvb9Ym6DroKlZ1FVMiB/WaEw/2eiIAGZobmBSWB9uYJE5MkwSISfVSrMuLlqRc0
/u5itFqfGYD5svD8MyIJOYEf3F02ew9VTjGGrmhgmaDPz4uFV26CtWblGcHyElrM
vDK8BVS3g+V45+URYnGpnQ1drEOKysxloYO/Y1h0HD0jRrlgzRWMt2Eg2OL/26CW
Lm2eIYxyx79AuusTHwIeqQOIAvPpl0MXaIOfJ9vek9x0fM3Mjr+oGE7tpoSLoXGj
LsOWlWc7XHNQ/XnTP7Hsp07X3lWgrTwenR+h8s3Ppl/PMluiLuQkt99XsBMBjPr0
aASNDgY509/6cocChAUaasyceYwCMmW4V6neXz3Yr2GKBpyjKn4yJCZo4YO3rx9r
g8rS+/DXs4iGEValie/kwcpG3/5lwxW5vgyUB2gpcKD2WWu40iHg5St0nmPl6wZG
v2fj6FdodZujJuEHZR9wymcDzhpbSV86HeMaVEDfH+5VLL/6RTAOKlDXQlnJwiEF
8kuVQBwDQJ0=V+q/
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-1961:01 Moderate: cairo and pixman security and bug fix

An update for cairo and pixman is now available for Red Hat Enterprise Linux 8

Summary

Cairo is a 2D graphics library designed to provide high-quality display and print output.
Pixman is a pixel manipulation library for the X Window System and Cairo.
Security Fix(es):
* cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes (CVE-2020-35492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2020-35492 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/

Package List

Red Hat Enterprise Linux AppStream (v. 8):
Source: cairo-1.15.12-6.el8.src.rpm pixman-0.38.4-2.el8.src.rpm
aarch64: cairo-1.15.12-6.el8.aarch64.rpm cairo-debuginfo-1.15.12-6.el8.aarch64.rpm cairo-debugsource-1.15.12-6.el8.aarch64.rpm cairo-devel-1.15.12-6.el8.aarch64.rpm cairo-gobject-1.15.12-6.el8.aarch64.rpm cairo-gobject-debuginfo-1.15.12-6.el8.aarch64.rpm cairo-gobject-devel-1.15.12-6.el8.aarch64.rpm cairo-tools-debuginfo-1.15.12-6.el8.aarch64.rpm pixman-0.38.4-2.el8.aarch64.rpm pixman-debuginfo-0.38.4-2.el8.aarch64.rpm pixman-debugsource-0.38.4-2.el8.aarch64.rpm pixman-devel-0.38.4-2.el8.aarch64.rpm
ppc64le: cairo-1.15.12-6.el8.ppc64le.rpm cairo-debuginfo-1.15.12-6.el8.ppc64le.rpm cairo-debugsource-1.15.12-6.el8.ppc64le.rpm cairo-devel-1.15.12-6.el8.ppc64le.rpm cairo-gobject-1.15.12-6.el8.ppc64le.rpm cairo-gobject-debuginfo-1.15.12-6.el8.ppc64le.rpm cairo-gobject-devel-1.15.12-6.el8.ppc64le.rpm cairo-tools-debuginfo-1.15.12-6.el8.ppc64le.rpm pixman-0.38.4-2.el8.ppc64le.rpm pixman-debuginfo-0.38.4-2.el8.ppc64le.rpm pixman-debugsource-0.38.4-2.el8.ppc64le.rpm pixman-devel-0.38.4-2.el8.ppc64le.rpm
s390x: cairo-1.15.12-6.el8.s390x.rpm cairo-debuginfo-1.15.12-6.el8.s390x.rpm cairo-debugsource-1.15.12-6.el8.s390x.rpm cairo-devel-1.15.12-6.el8.s390x.rpm cairo-gobject-1.15.12-6.el8.s390x.rpm cairo-gobject-debuginfo-1.15.12-6.el8.s390x.rpm cairo-gobject-devel-1.15.12-6.el8.s390x.rpm cairo-tools-debuginfo-1.15.12-6.el8.s390x.rpm pixman-0.38.4-2.el8.s390x.rpm pixman-debuginfo-0.38.4-2.el8.s390x.rpm pixman-debugsource-0.38.4-2.el8.s390x.rpm pixman-devel-0.38.4-2.el8.s390x.rpm
x86_64: cairo-1.15.12-6.el8.i686.rpm cairo-1.15.12-6.el8.x86_64.rpm cairo-debuginfo-1.15.12-6.el8.i686.rpm cairo-debuginfo-1.15.12-6.el8.x86_64.rpm cairo-debugsource-1.15.12-6.el8.i686.rpm cairo-debugsource-1.15.12-6.el8.x86_64.rpm cairo-devel-1.15.12-6.el8.i686.rpm cairo-devel-1.15.12-6.el8.x86_64.rpm cairo-gobject-1.15.12-6.el8.i686.rpm cairo-gobject-1.15.12-6.el8.x86_64.rpm cairo-gobject-debuginfo-1.15.12-6.el8.i686.rpm cairo-gobject-debuginfo-1.15.12-6.el8.x86_64.rpm cairo-gobject-devel-1.15.12-6.el8.i686.rpm cairo-gobject-devel-1.15.12-6.el8.x86_64.rpm cairo-tools-debuginfo-1.15.12-6.el8.i686.rpm cairo-tools-debuginfo-1.15.12-6.el8.x86_64.rpm pixman-0.38.4-2.el8.i686.rpm pixman-0.38.4-2.el8.x86_64.rpm pixman-debuginfo-0.38.4-2.el8.i686.rpm pixman-debuginfo-0.38.4-2.el8.x86_64.rpm pixman-debugsource-0.38.4-2.el8.i686.rpm pixman-debugsource-0.38.4-2.el8.x86_64.rpm pixman-devel-0.38.4-2.el8.i686.rpm pixman-devel-0.38.4-2.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2022:1961-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:1961
Issued Date: : 2022-05-10
CVE Names: CVE-2020-35492

Topic

An update for cairo and pixman is now available for Red Hat EnterpriseLinux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

1898396 - CVE-2020-35492 cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes


Related News