[ GLSA 201711-08 ] LibXfont, LibXfont2: Multiple vulnerabilities

\n\n–nextPart6242481.ef9iPOlHeO
Content-Type: multipart/alternative; boundary=”nextPart2569574.MKoCz7C4y4″
Content-Transfer-Encoding: 7Bit

This is a multi-part message in MIME format.

–nextPart2569574.MKoCz7C4y4
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset=”us-ascii”

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201711-08
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: LibXfont, LibXfont2: Multiple vulnerabilities
Date: November 11, 2017
Bugs: #634044
ID: 201711-08

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

Multiple vulnerabilities have been found in LibXfont and Libxfont2, the
worst of which could allow attackers to cause a Denial of Service
condition.

Background
==========

X.Org Xfont library

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 x11-libs/libXfont2 = 2.0.2
2 x11-libs/libXfont = 1.5.3
——————————————————————-
2 affected packages

Description
===========

Multiple vulnerabilities have been discovered in LibXfont and
LibXfont2. Please review the referenced CVE identifiers for details.

Impact
======

Local attackers could obtain sensitive information or possibly cause a
Denial of Service condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All LibXfont2 users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=x11-libs/libXfont2-2.0.2”

All LibXfont users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=x11-libs/libXfont-1.5.3″

References
==========

[ 1 ] CVE-2017-13720
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13720
[ 2 ] CVE-2017-13722
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13722

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201711-08

Concerns?
–nextPart2569574.MKoCz7C4y4
Content-Transfer-Encoding: 7Bit
Content-Type: text/html; charset=”us-ascii”

p, li { white-space: pre-wrap; }

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Gentoo Linux Security Advisory GLSA 201711-08

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

https://security.gentoo.org/

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

 

Severity: Normal

Title: LibXfont, LibXfont2: Multiple vulnerabilities

Date: November 11, 2017

Bugs: #634044

ID: 201711-08

 

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

 

Synopsis

========

 

Multiple vulnerabilities have been found in LibXfont and Libxfont2, the

worst of which could allow attackers to cause a Denial of Service

condition.

 

Background

==========

 

X.Org Xfont library

 

Affected packages

=================

 

——————————————————————-

Package / Vulnerable / Unaffected

——————————————————————-

1 x11-libs/libXfont2 < 2.0.2 >= 2.0.2

2 x11-libs/libXfont < 1.5.3 >= 1.5.3

——————————————————————-

2 affected packages

 

Description

===========

 

Multiple vulnerabilities have been discovered in LibXfont and

LibXfont2. Please review the referenced CVE identifiers for details.

 

Impact

======

 

Local attackers could obtain sensitive information or possibly cause a

Denial of Service condition.

 

Workaround

==========

 

There is no known workaround at this time.

 

Resolution

==========

 

All LibXfont2 users should upgrade to the latest version:

 

# emerge –sync

# emerge –ask –oneshot –verbose ">=x11-libs/libXfont2-2.0.2"

 

All LibXfont users should upgrade to the latest version:

 

# emerge –sync

# emerge –ask –oneshot –verbose ">=x11-libs/libXfont-1.5.3"

 

References

==========

 

[ 1 ] CVE-2017-13720

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13720

[ 2 ] CVE-2017-13722

https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13722

 

Availability

============

 

This GLSA and any updates to it are available for viewing at

the Gentoo Security Website:

 

https://security.gentoo.org/glsa/201711-08

 

Concerns?

=========

 

Security is a primary focus of Gentoo Linux and ensuring the

confidentiality and security of our users’ machines is of utmost

importance to us. Any security concerns should be addressed to

security@gentoo.org or alternatively, you may file a bug at

https://bugs.gentoo.org.

 

License

=======

 

Copyright 2017 Gentoo Foundation, Inc; referenced text

belongs to its owner(s).

 

The contents of this document are licensed under the

Creative Commons – Attribution / Share Alike license.

 

http://creativecommons.org/licenses/by-sa/2.5

–nextPart2569574.MKoCz7C4y4–

–nextPart6242481.ef9iPOlHeO
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part.
Content-Transfer-Encoding: 7Bit

—–BEGIN PGP SIGNATURE—–

iQEyBAABCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAloHETYACgkQpRQw84X1
dt1Sywf4qv3D9SKaSRpi9SuAStxueJkeaXG6oauFSAEMMg+db/+yZR9VEXFotxDC
I8eHnJ8M/mgQsh4jn02uC2gy16E/6urgcOaMEsiaQuu8g/Uo1fdsxqyVGb7qPS1C
8/zomUN/A4xicn4IOF1nKNLBU8VUgfNb5NsUmgHrtLsBytW2Vy2SQuPI6J2VUgDd
M3XpWwkopzv8W1V/icaeF8DTEUBHTmfWkotxLrVgIfzvH+h9m5oqyU6bJbJq/kfQ
pLqGRCC9xt1a1ddWOvGbzz/TAlOVwwe+8QsCpgVnBsRd2tSe4VtUqURuz3gWeHFK
IL4fqrpg1qzAd0yV5GCx4Il9BVNV
=WhuW
—–END PGP SIGNATURE—–

–nextPart6242481.ef9iPOlHeO–