The bdf parser read metrics values as 32-bit integers, but stored them into 16-bit integers. Overflows could occur in various operations leading to out-of-bounds memory access.
A local user could exploit this issue to potentially execute arbitrary code with the privileges of the X.Org server.
Created libXfont tracking bugs for this issue:
Affects: fedora-all [bug 1203720]
libXfont-1.5.1-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 6
Via RHSA-2015:1708 https://rhn.redhat.com/errata/RHSA-2015-1708.html
Does this problem CVE affect libXfont shipped with RHEL5?
Yes, from the whiteboard RHEL 5 is affected:
However, RHEL 5 has entered Production Phase 3 as of January 31, 2014. As per our errata policy:
"During the Production 3 Phase, Critical impact Security Advisories (RHSAs) and selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available."
Red Hat Enterprise Linux Life Cycle
This means that Red Hat will not be addressing Low, Moderate, or Important impact CVE's in relation to RHEL 5.