CVE-2017-13720

Priority
Low
Description
In the PatternMatch function in fontfile/fontdir.c in libXfont through
1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can
cause a buffer over-read during pattern matching of fonts, leading to
information disclosure or a crash (denial of service). This occurs because
'\0' characters are incorrectly skipped in situations involving ?
characters.
References
Assigned-to
mdeslaur
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):released (1:2.0.1-3ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):released (1:1.4.7-1ubuntu0.3)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (1:1.5.1-1ubuntu0.16.04.3)
Ubuntu 17.04 (Zesty Zapus):released (1:2.0.1-3ubuntu0.1)
Patches:
Upstream:https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):released (1:1.5.2-4ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 17.04 (Zesty Zapus):released (1:1.5.2-4ubuntu0.1)
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):DNE
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (1:2.0.1-3~ubuntu16.04.2)
Ubuntu 17.04 (Zesty Zapus):DNE
More Information

Updated: 2017-10-12 04:14:44 UTC (commit 13499)