[Bug 1500690] New: CVE-2017-13720 libXfont:
Insufficient input validation in fontdir.c
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1500690
Bug ID: 1500690
Summary: CVE-2017-13720 libXfont: Insufficient input validation
in fontdir.c
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: anemec(a)redhat.com
CC: ajax(a)redhat.com, alexl(a)redhat.com,
btissoir(a)redhat.com, caillon+fedoraproject(a)gmail.com,
caolanm(a)redhat.com,
fonts-bugs(a)lists.fedoraproject.org,
jglisse(a)redhat.com, john.j5live(a)gmail.com,
mbarnes(a)fastmail.com, rhughes(a)redhat.com,
rstrode(a)redhat.com, sandmann(a)redhat.com
It was discovered that libXfont incorrectly handled certain patterns in
PatternMatch. A local attacker could use this issue to cause libXfont to
crash, resulting in a denial of service, or possibly obtain sensitive
information.
Upstream patch:
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8...
--
You are receiving this mail because:
You are on the CC list for the bug.
5 years, 3 months
[Bug 1526142] New: CVE-2017-17521 fontforge:
Command injetion in help function uiutil.c
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1526142
Bug ID: 1526142
Summary: CVE-2017-17521 fontforge: Command injetion in help
function uiutil.c
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: psampaio(a)redhat.com
CC: eng-i18n-bugs(a)redhat.com,
fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
paul(a)frixxon.co.uk, pnemade(a)redhat.com
A flaw was found in FontForge through 20170731. uiutil.c does not validate
strings before launching the program specified by the BROWSER environment
variable, which might allow remote attackers to conduct argument-injection
attacks via a crafted URL. A different vulnerability than CVE-2017-17534.
References:
https://security-tracker.debian.org/tracker/CVE-2017-17521
--
You are receiving this mail because:
You are on the CC list for the bug.
5 years, 4 months
[Bug 1475398] New:
CVE-2017-11568 CVE-2017-11569 CVE-2017-11570 CVE-2017-11571 CVE-2017-11572
CVE-2017-11573 CVE-2017-11574 CVE-2017-11575 CVE-2017-11576 CVE-2017-11577
fontforge
: various flaws [fedora-all]
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1475398
Bug ID: 1475398
Summary: CVE-2017-11568 CVE-2017-11569 CVE-2017-11570
CVE-2017-11571 CVE-2017-11572 CVE-2017-11573
CVE-2017-11574 CVE-2017-11575 CVE-2017-11576
CVE-2017-11577 fontforge: various flaws [fedora-all]
Product: Fedora
Version: 26
Component: fontforge
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: kevin(a)scrye.com
Reporter: anemec(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: fonts-bugs(a)lists.fedoraproject.org, kevin(a)scrye.com,
paul(a)frixxon.co.uk, pnemade(a)redhat.com
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
5 years, 4 months