USN-344-1: X.org vulnerabilities
13 September 2006
X.org vulnerabilities
Releases
Details
iDefense security researchers found several integer overflows in
X.org's font handling library. By using a specially crafted Type1 CID
font file, a local user could exploit these to crash the X server or
execute arbitrary code with root privileges.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 6.06
-
libxfont1
-
1:1.0.0-0ubuntu3.2
Ubuntu 5.10
-
libxfont1
-
1:0.99.0+cvs.20050909-1.2
Ubuntu 5.04
-
libfs6
-
6.8.2-10.4
-
xserver-xorg
-
6.8.2-10.4
After a standard system upgrade you need to restart your X session to
effect the necessary changes.