Fedora Linux 8743 Published by

A mingw-pixman security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: mingw-pixman-0.42.2-1.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-3cf0e7ebc7
2022-11-13 01:15:48.363409
--------------------------------------------------------------------------------

Name : mingw-pixman
Product : Fedora 36
Version : 0.42.2
Release : 1.fc36
URL :   http://cgit.freedesktop.org/pixman/
Summary : MinGW Windows Pixman library
Description :
MinGW Windows Pixman library.

--------------------------------------------------------------------------------
Update Information:

Update to 0.42.2, fixes CVE-2022-44638 and CVE-2022-43680.
--------------------------------------------------------------------------------
ChangeLog:

* Fri Nov 4 2022 Sandro Mani - 0.42.2-1
- Update to 0.42.2
* Thu Jul 21 2022 Fedora Release Engineering - 0.40.0-7
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
* Fri Mar 25 2022 Sandro Mani - 0.40.0-6
- Rebuild with mingw-gcc-12
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2139989 - CVE-2022-44638 mingw-pixman: pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write [fedora-35]
  https://bugzilla.redhat.com/show_bug.cgi?id=2139989
[ 2 ] Bug #2139991 - CVE-2022-44638 mingw-pixman: pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write [fedora-36]
  https://bugzilla.redhat.com/show_bug.cgi?id=2139991
[ 3 ] Bug #2140061 - CVE-2022-43680 mingw-expat: expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations [fedora-35]
  https://bugzilla.redhat.com/show_bug.cgi?id=2140061
[ 4 ] Bug #2140064 - CVE-2022-43680 mingw-expat: expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations [fedora-36]
  https://bugzilla.redhat.com/show_bug.cgi?id=2140064
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-3cf0e7ebc7' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________