ALAS-2015-597


Amazon Linux 1 (EOL) Security Advisory: ALAS-2015-597
Advisory Released Date: 2015-09-22
Advisory Updated Date: 2015-09-22
Severity: Important

Issue Overview:

An integer overflow flaw was found in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1802)

An integer truncation flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1804)

A NULL pointer dereference flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server. (CVE-2015-1803)


Affected Packages:

libXfont


Issue Correction:
Run yum update libXfont to update your system.

New Packages:
i686:
    libXfont-debuginfo-1.4.5-5.12.amzn1.i686
    libXfont-devel-1.4.5-5.12.amzn1.i686
    libXfont-1.4.5-5.12.amzn1.i686

src:
    libXfont-1.4.5-5.12.amzn1.src

x86_64:
    libXfont-devel-1.4.5-5.12.amzn1.x86_64
    libXfont-1.4.5-5.12.amzn1.x86_64
    libXfont-debuginfo-1.4.5-5.12.amzn1.x86_64