First published: Fri Mar 18 2016(Updated: )
A vulnerability was found in cairo. A maliciously crafted file can cause out of bounds read in fill_xrgb32_lerp_opaque_spans function in cairo, thus crashing the software. Upstream fix: <a href="https://cgit.freedesktop.org/cairo/patch/src/cairo-image-compositor.c?id=5c82d91a5e15d29b1489dcb413b24ee7fdf59934">https://cgit.freedesktop.org/cairo/patch/src/cairo-image-compositor.c?id=5c82d91a5e15d29b1489dcb413b24ee7fdf59934</a> References: <a href="http://seclists.org/oss-sec/2016/q1/675">http://seclists.org/oss-sec/2016/q1/675</a> External references: <a href="https://mail.gnome.org/archives/gnome-announce-list/2015-March/msg00047.html">https://mail.gnome.org/archives/gnome-announce-list/2015-March/msg00047.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cairo | <1.14.2 | 1.14.2 |
SUSE Linux | =13.2 | |
Cairo Graphics | <=1.12.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3190 has been classified as a high severity vulnerability due to its potential to cause crashes in processes utilizing the affected libraries.
To fix CVE-2016-3190, you should upgrade Cairo to version 1.14.2 or later in your system.
CVE-2016-3190 affects Cairo versions up to and including 1.12.16 and is found in packages like cairo for Red Hat and openSUSE 13.2.
CVE-2016-3190 can be exploited via a maliciously crafted file that triggers an out of bounds read, potentially leading to application crashes.
As of now, there have been no publicly disclosed exploits specifically targeting CVE-2016-3190.