Bug 1048044 (CVE-2013-6462)

Summary: CVE-2013-6462 libXfont: stack-based buffer overflow flaw when parsing Glyph Bitmap Distribution Format (BDF) fonts
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: jkurik, jrusnack, karlamrhein, mkolbas, pfrields, sandmann, security-response-team, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: libXfont 1.4.7 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-01-10 09:57:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1048048, 1049569, 1049684, 1049685, 1049686, 1049687    
Bug Blocks: 1048049    

Description Murray McAllister 2014-01-03 01:39:56 UTC
A stack-based buffer overflow flaw was found in the way the libXfont library, used by the X.Org server, parsed Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could exploit this issue to potentially execute arbitrary code with the privileges of the X.Org server.

Acknowledgements:

Red Hat would like to thank the X.Org security team for reporting this issue.

Comment 8 Vincent Danen 2014-01-07 19:13:26 UTC
This issue is now public, and is noted as being fixed in libXfont 1.4.7 via the following commit:

http://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=4d024ac10f964f6bd372ae0dd14f02772a6e5f63

It is also noted as affecting every version of X from X11R5 to libXfont 1.4.6.


External References:

http://lists.x.org/archives/xorg-announce/2014-January/002389.html

Comment 9 Vincent Danen 2014-01-07 19:15:44 UTC
Created libXfont tracking bugs for this issue:

Affects: fedora-all [bug 1049569]

Comment 12 errata-xmlrpc 2014-01-10 09:46:22 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2014:0018 https://rhn.redhat.com/errata/RHSA-2014-0018.html

Comment 13 Tomas Hoger 2014-01-10 10:22:41 UTC
Some media coverage:

http://www.theregister.co.uk/2014/01/09/x11_has_privilege_escalation_bug/