ALAS-2015-597


Amazon Linux 1 Security Advisory: ALAS-2015-597
Advisory Release Date: 2015-09-22 10:00 Pacific
Advisory Updated Date: 2015-09-22 10:00 Pacific
Severity: Important

Issue Overview:

An integer overflow flaw was found in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1802)

An integer truncation flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1804)

A NULL pointer dereference flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server. (CVE-2015-1803)


Affected Packages:

libXfont


Issue Correction:
Run yum update libXfont to update your system.

New Packages:
i686:
    libXfont-debuginfo-1.4.5-5.12.amzn1.i686
    libXfont-devel-1.4.5-5.12.amzn1.i686
    libXfont-1.4.5-5.12.amzn1.i686

src:
    libXfont-1.4.5-5.12.amzn1.src

x86_64:
    libXfont-devel-1.4.5-5.12.amzn1.x86_64
    libXfont-1.4.5-5.12.amzn1.x86_64
    libXfont-debuginfo-1.4.5-5.12.amzn1.x86_64