Updated libxfont packages fix security vulnerabilities
Publication date: 18 Oct 2017Modification date: 18 Oct 2017
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-13720 , CVE-2017-13722
Description
In the PatternMatch function in fontfile/fontdir.c in libXfont through
1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection
can cause a buffer over-read during pattern matching of fonts, leading
to information disclosure or a crash (denial of service). This occurs
because '\0' characters are incorrectly skipped in situations involving
? characters. (CVE-2017-13720)
In the pcfGetProperties function in bitmap/pcfread.c in libXfont through
1.5.2 and 2.x before 2.0.2, a missing boundary check (for PCF files)
could be used by local attackers authenticated to an Xserver for a
buffer over-read, for information disclosure or a crash of the X server.
(CVE-2017-13722)
References
SRPMS
5/core
- libxfont-1.5.1-1.1.mga5
6/core
- libxfont-1.5.2-1.1.mga6
- libxfont2-2.0.1-4.1.mga6