Your submission was sent successfully! Close

USN-344-1: X.org vulnerabilities

13 September 2006

X.org vulnerabilities

Releases

Details

iDefense security researchers found several integer overflows in
X.org's font handling library. By using a specially crafted Type1 CID
font file, a local user could exploit these to crash the X server or
execute arbitrary code with root privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.06
  • libxfont1 - 1:1.0.0-0ubuntu3.2
Ubuntu 5.10
  • libxfont1 - 1:0.99.0+cvs.20050909-1.2
Ubuntu 5.04
  • libfs6 - 6.8.2-10.4
  • xserver-xorg - 6.8.2-10.4

After a standard system upgrade you need to restart your X session to
effect the necessary changes.