8.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:C/I:C/A:C
The libXfont package provides the X.Org libXfont runtime library. X.Org is an open source implementation of the X Window System. An integer overflow flaw was found in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1802) An integer truncation flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1804) A NULL pointer dereference flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server. (CVE-2015-1803) All libXfont users are advised to upgrade to this updated package, which contains backported patches to correct these issues.
advisories.mageia.org/MGASA-2015-0113.html
lists.fedoraproject.org/pipermail/package-announce/2015-March/152497.html
lists.fedoraproject.org/pipermail/package-announce/2015-March/152838.html
lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html
lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html
lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html
rhn.redhat.com/errata/RHSA-2015-1708.html
www.debian.org/security/2015/dsa-3194
www.mandriva.com/security/advisories?name=MDVSA-2015:145
www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
www.securityfocus.com/bid/73280
www.securitytracker.com/id/1031935
www.ubuntu.com/usn/USN-2536-1
www.x.org/wiki/Development/Security/Advisory-2015-03-17/
access.redhat.com/security/updates/classification/#important
rhn.redhat.com/errata/RHSA-2015-1708.html
security.gentoo.org/glsa/201507-21