UbuntuUpdates.org

Package "libxfont"

Name: libxfont

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • X11 font rasterisation library
  • X11 font rasterisation library (debug package)
  • X11 font rasterisation library (development headers)

Latest version: 1:1.5.1-1ubuntu0.16.04.4
Release: xenial (16.04)
Level: security
Repository: main

Links



Other versions of "libxfont" in Xenial

Repository Area Version
base main 1:1.5.1-1
updates main 1:1.5.1-1ubuntu0.16.04.4

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1:1.5.1-1ubuntu0.16.04.4 2017-11-29 19:06:47 UTC

  libxfont (1:1.5.1-1ubuntu0.16.04.4) xenial-security; urgency=medium

  * SECURITY UPDATE: non-privileged arbitrary file access
    - debian/patches/CVE-2017-16611.patch: open files with O_NOFOLLOW in
      src/fontfile/dirfile.c, src/fontfile/fileio.c.
    - CVE-2017-16611

 -- Marc Deslauriers <email address hidden> Tue, 28 Nov 2017 14:46:50 -0500

Source diff to previous version
CVE-2017-16611 Open files with O_NOFOLLOW

Version: 1:1.5.1-1ubuntu0.16.04.3 2017-10-10 16:07:00 UTC

  libxfont (1:1.5.1-1ubuntu0.16.04.3) xenial-security; urgency=medium

  * SECURITY UPDATE: invalid memory read in PatternMatch
    - debian/patches/CVE-2017-13720.patch: check for end of string in
      src/fontfile/fontdir.c.
    - CVE-2017-13720
  * SECURITY UPDATE: DoS or info leak via malformed PCF file
    - debian/patches/CVE-2017-13722.patch: check string boundaries in
      src/bitmap/pcfread.c.
    - CVE-2017-13722

 -- Marc Deslauriers <email address hidden> Fri, 06 Oct 2017 11:44:24 -0400

CVE-2017-1372 IBM TRIRIGA Application Platform 3.3, 3.4, and 3.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScri



About   -   Send Feedback to @ubuntu_updates