Bug 1048044 - (CVE-2013-6462) CVE-2013-6462 libXfont: stack-based buffer overflow flaw when parsing Glyph Bitmap Distribution Format (BDF) fonts
CVE-2013-6462 libXfont: stack-based buffer overflow flaw when parsing Glyph B...
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1048048 1049569 1049684 1049685 1049686 1049687
Blocks: 1048049
  Show dependency treegraph
Reported: 2014-01-02 20:39 EST by Murray McAllister
Modified: 2015-11-24 10:38 EST (History)
8 users (show)

See Also:
Fixed In Version: libXfont 1.4.7
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2014-01-10 04:57:13 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Murray McAllister 2014-01-02 20:39:56 EST
A stack-based buffer overflow flaw was found in the way the libXfont library, used by the X.Org server, parsed Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could exploit this issue to potentially execute arbitrary code with the privileges of the X.Org server.


Red Hat would like to thank the X.Org security team for reporting this issue.
Comment 8 Vincent Danen 2014-01-07 14:13:26 EST
This issue is now public, and is noted as being fixed in libXfont 1.4.7 via the following commit:


It is also noted as affecting every version of X from X11R5 to libXfont 1.4.6.

External References:

Comment 9 Vincent Danen 2014-01-07 14:15:44 EST
Created libXfont tracking bugs for this issue:

Affects: fedora-all [bug 1049569]
Comment 12 errata-xmlrpc 2014-01-10 04:46:22 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2014:0018 https://rhn.redhat.com/errata/RHSA-2014-0018.html
Comment 13 Tomas Hoger 2014-01-10 05:22:41 EST
Some media coverage:


Note You need to log in before you can comment on or make changes to this bug.