CVE-2017-13720

Priority
Description
In the PatternMatch function in fontfile/fontdir.c in libXfont through
1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can
cause a buffer over-read during pattern matching of fonts, leading to
information disclosure or a crash (denial of service). This occurs because
'\0' characters are incorrectly skipped in situations involving ?
characters.
Assigned-to
mdeslaur
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):released (1:1.4.7-1ubuntu0.3)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:1.5.1-1ubuntu0.16.04.3)
Patches:
Upstream:https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (1:2.0.1-3~ubuntu16.04.2)
More Information

Updated: 2019-12-05 18:48:07 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)