CVE-2015-5297

An integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code.
References
Link Resource
https://bugs.freedesktop.org/show_bug.cgi?id=92027 Exploit Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-5297 Issue Tracking Patch Third Party Advisory
https://bugs.freedesktop.org/show_bug.cgi?id=92027 Exploit Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-5297 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:pixman:pixman:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:32

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 6.7
References () https://bugs.freedesktop.org/show_bug.cgi?id=92027 - Exploit, Third Party Advisory () https://bugs.freedesktop.org/show_bug.cgi?id=92027 - Exploit, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-5297 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-5297 - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2019-07-31 23:15

Updated : 2024-11-21 02:32


NVD link : CVE-2015-5297

Mitre link : CVE-2015-5297

CVE.ORG link : CVE-2015-5297


JSON object : View

Products Affected

pixman

  • pixman
CWE
CWE-190

Integer Overflow or Wraparound