ALAS-2014-404 ---- libXfontID: oval:org.secpod.oval:def:1600183 | Date: (C)2016-01-19 (M)2023-12-07 |
Class: PATCH | Family: unix |
Multiple integer overflows in the fs_get_reply, fs_alloc_glyphs, and fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the _fs_recv_conn_setup, fs_read_open_font, fs_read_query_info, fs_read_extent_info, fs_read_glyphs, fs_read_list, or fs_read_list_info function.Multiple integer overflows in the FontFileAddEntry and lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
Platform: |
Amazon Linux AMI |