On 2017-11-01 01:07 PM, Alexander Kanavin wrote:
On 11/01/2017 06:28 PM, Catalin Enache wrote:
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information
disclosure or a crash (denial of service). This occurs because '\0'
characters are incorrectly skipped in situations involving ? characters.

In the pcfGetProperties function in bitmap/pcfread.c in libXfont through 1.5.2 and 2.x before 2.0.2, a missing boundary check (for PCF files) could be used by local attackers authenticated to an Xserver for a buffer over-read, for
information disclosure or a crash of the X server.

If both 1.x and 2.x are vulnerable, you should update them both (not just 1.x).

Sure but 2.x isn't in morty, see below.

Also, it's better to update to a version that is not vulnerable, rather than backport patches.

Alex

Alex,

Catalin works on the WR sustaining team so his mandate is to take care
of released products where updating isn't typically permitted.
Now that oe-core-2.2 is out, we'll be sending patches for rocko as
well but we're in a transition time for a while so bear with us please.
If master and rocko have the same code, then of course we Catalin would
target master and arrange to have the commit backported.

Catalin,

Please tag your commits if they are strictly for the morty
branch using something like:
   [OE-core][morty][PATCH] foo: the bar should be zinged
   [OE-core][PATCH][morty] foo: the bar should be zinged

as per:
   https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance

Thanks,
--
# Randy MacLeod.  WR Linux
# Wind River an Intel Company
--
_______________________________________________
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core

Reply via email to