First published: Thu May 15 2014(Updated: )
Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 | |
Canonical Ubuntu Linux | =13.10 | |
Canonical Ubuntu Linux | =14.04 | |
X Libxfont | <=1.4.7 | |
X Libxfont | =1.2.3 | |
X Libxfont | =1.2.4 | |
X Libxfont | =1.2.5 | |
X Libxfont | =1.2.6 | |
X Libxfont | =1.2.7 | |
X Libxfont | =1.2.8 | |
X Libxfont | =1.2.9 | |
X Libxfont | =1.3.0 | |
X Libxfont | =1.3.1 | |
X Libxfont | =1.3.2 | |
X Libxfont | =1.3.3 | |
X Libxfont | =1.3.4 | |
X Libxfont | =1.4.0 | |
X Libxfont | =1.4.1 | |
X Libxfont | =1.4.2 | |
X Libxfont | =1.4.3 | |
X Libxfont | =1.4.4 | |
X Libxfont | =1.4.5 | |
X Libxfont | =1.4.6 | |
X Libxfont | =1.4.99 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.