CVE-2014-0211
Publication date 13 May 2014
Last updated 24 July 2024
Ubuntu priority
Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
Status
Package | Ubuntu Release | Status |
---|---|---|
libxfont | 14.04 LTS trusty |
Not affected
|
Notes
mdeslaur
trusty and later are built with --disable-fc, so this shouldn't be an issue. Adding patch anyway for completeness' sake.
References
Related Ubuntu Security Notices (USN)
- USN-2211-1
- libXfont vulnerabilities
- 14 May 2014