USN-448-1: X.org vulnerabilities
3 April 2007
freetype, libxfont, xorg, xorg-server vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 6.10
- Ubuntu 6.06 LTS
- Ubuntu 5.10
Software Description
Details
Sean Larsson of iDefense Labs discovered that the MISC-XC extension of Xorg did not correctly verify the size of allocated memory. An authenticated user could send a specially crafted X11 request and execute arbitrary code with root privileges. (CVE-2007-1003)
Greg MacManus of iDefense Labs discovered that the BDF font handling code in Xorg and FreeType did not correctly verify the size of allocated memory. If a user were tricked into using a specially crafted font, a remote attacker could execute arbitrary code with root privileges. (CVE-2007-1351, CVE-2007-1352)
Update instructions
The problem can be corrected by updating your system to the following package versions:
- Ubuntu 6.10
- libfreetype6 - 2.2.1-5ubuntu0.1
- libxfont1 - 1:1.2.0-0ubuntu3.1
- xserver-xorg-core - 1:1.1.1-0ubuntu12.2
- Ubuntu 6.06 LTS
- libfreetype6 - 2.1.10-1ubuntu2.3
- libxfont1 - 1:1.0.0-0ubuntu3.3
- xserver-xorg-core - 1:1.0.2-0ubuntu10.6
- Ubuntu 5.10
- libfreetype6 - 2.1.7-2.4ubuntu1.3
- libxfont1 - 1:0.99.0+cvs.20050909-1.3
- xserver-xorg-core - 6.8.2-77.3
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system upgrade you need to reboot your computer to effect the necessary changes.