Univention Bugzilla – Bug 45621
libxfont: Multiple issues (4.2)
Last modified: 2018-05-08 14:56:38 CEST
Upstream Debian package version 1:1.5.1-1+deb8u1 fixes: * In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters. (CVE-2017-13720) * In the pcfGetProperties function in bitmap/pcfread.c in libXfont through 1.5.2 and 2.x before 2.0.2, a missing boundary check (for PCF files) could be used by local attackers authenticated to an Xserver for a buffer over-read, for information disclosure or a crash of the X server. (CVE-2017-13722)
Mass-import from Debian-Security: python -m univention.repong.^Cbmirror -s jessie -r 4.2-3 --override=$HOME/REPOS/repo-ng/mirror/update_ucs42_mirror_from_debian.yml --errata=doc/errata --sql --process=ALL -vvvv --now=201801211553 YAML: git:bd6159834a..449aa5a7cf
--- mirror/ftp/4.2/unmaintained/4.2-0/source/libxfont_1.5.1-1.dsc +++ apt/ucs_4.2-0-errata4.2-3/source/libxfont_1.5.1-1+deb8u1.dsc @@ -1,3 +1,8 @@ +1:1.5.1-1+deb8u1 [Mon, 09 Oct 2017 18:30:05 +0200] Julien Cristau <jcristau@debian.org>: + + * Check for end of string in PatternMatch (CVE-2017-13720) + * pcfGetProperties: Check string boundaries (CVE-2017-13722) + 1:1.5.1-1 [Tue, 17 Mar 2015 16:55:21 +0100] Julien Cristau <jcristau@debian.org>: * New upstream release
* No UCS specific patches * Comparison to previously shipped version ok * Binary package update Ok * Advisory adjusted: c9acb760f3 | Sort CVEs
<http://errata.software-univention.de/ucs/4.2/360.html>