USN-344-1: X.org vulnerabilities

Publication date

13 September 2006

Overview

X.org vulnerabilities


Details

iDefense security researchers found several integer overflows in
X.org’s font handling library. By using a specially crafted Type1 CID
font file, a local user could exploit these to crash the X server or
execute arbitrary code with root privileges.

iDefense security researchers found several integer overflows in
X.org’s font handling library. By using a specially crafted Type1 CID
font file, a local user could exploit these to crash the X server or
execute arbitrary code with root privileges.

Update instructions

After a standard system upgrade you need to restart your X session to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
6.06 dapper libxfont1 –  1:1.0.0-0ubuntu3.2
5.10 breezy libxfont1 –  1:0.99.0+cvs.20050909-1.2
5.04 hoary libfs6 –  6.8.2-10.4
xserver-xorg –  6.8.2-10.4

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›