First published: Wed Oct 11 2017(Updated: )
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
X.Org libXfont | <=1.5.2 | |
X.Org libXfont | =2.0.0 | |
X.Org libXfont | =2.0.1 |
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.