Mailinglist Archive: opensuse-updates (86 mails)

< Previous Next >
openSUSE-SU-2014:0711-1: moderate: libXfont: Fixed multiple vulnerabilities
openSUSE Security Update: libXfont: Fixed multiple vulnerabilities
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0711-1
Rating: moderate
References: #857544
Cross-References: CVE-2014-0209 CVE-2014-0210 CVE-2014-0211

Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

libxfont was updated to fix multiple vulnerabilities:
- Integer overflow of allocations in font metadata file parsing
(CVE-2014-0209).
- Unvalidated length fields when parsing xfs protocol replies
(CVE-2014-0210).
- Integer overflows calculating memory needs for xfs replies
(CVE-2014-0211).

These vulnerabilities could be used by a local, authenticated user to
raise privileges
or by a remote attacker with control of the font server to execute code
with the privileges of the X server.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.1:

zypper in -t patch openSUSE-2014-391

- openSUSE 12.3:

zypper in -t patch openSUSE-2014-391

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.1 (i586 x86_64):

libXfont-debugsource-1.4.6-2.8.1
libXfont-devel-1.4.6-2.8.1
libXfont1-1.4.6-2.8.1
libXfont1-debuginfo-1.4.6-2.8.1

- openSUSE 13.1 (x86_64):

libXfont-devel-32bit-1.4.6-2.8.1
libXfont1-32bit-1.4.6-2.8.1
libXfont1-debuginfo-32bit-1.4.6-2.8.1

- openSUSE 12.3 (i586 x86_64):

libXfont-debugsource-1.4.5-4.8.1
libXfont-devel-1.4.5-4.8.1
libXfont1-1.4.5-4.8.1
libXfont1-debuginfo-1.4.5-4.8.1

- openSUSE 12.3 (x86_64):

libXfont-devel-32bit-1.4.5-4.8.1
libXfont1-32bit-1.4.5-4.8.1
libXfont1-debuginfo-32bit-1.4.5-4.8.1


References:

http://support.novell.com/security/cve/CVE-2014-0209.html
http://support.novell.com/security/cve/CVE-2014-0210.html
http://support.novell.com/security/cve/CVE-2014-0211.html
https://bugzilla.novell.com/857544


< Previous Next >
This Thread
  • No further messages