Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 497416 (CVE-2013-6462) - <x11-libs/libXfont-1.4.7 sscanf overflow (CVE-2013-6462)
Summary: <x11-libs/libXfont-1.4.7 sscanf overflow (CVE-2013-6462)
Status: RESOLVED FIXED
Alias: CVE-2013-6462
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal critical (vote)
Assignee: Gentoo Security
URL: http://lists.x.org/archives/xorg-anno...
Whiteboard: A1 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-01-07 17:22 UTC by Chí-Thanh Christopher Nguyễn
Modified: 2014-02-21 16:08 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Chí-Thanh Christopher Nguyễn gentoo-dev 2014-01-07 17:22:01 UTC
X.Org Security Advisory: January 7, 2014 - CVE-2013-6462
Stack buffer overflow in parsing of BDF font files in libXfont
==============================================================

Description:
============

Scanning of the libXfont sources with the cppcheck static analyzer
included a report of:

  [lib/libXfont/src/bitmap/bdfread.c:341]: (warning)
      scanf without field width limits can crash with huge input data.

Evaluation of this report by X.Org developers concluded that a BDF font
file containing a longer than expected string could overflow the buffer
on the stack.  Testing in X servers built with Stack Protector resulted
in an immediate crash when reading a user-provided specially crafted font.
Comment 1 Chí-Thanh Christopher Nguyễn gentoo-dev 2014-01-07 17:25:28 UTC
libXfont-1.4.7 has been committed which fixes the issue, and can be stabilized if no serious issues are reported with it.
Comment 2 Chí-Thanh Christopher Nguyễn gentoo-dev 2014-01-09 14:24:02 UTC
No problems reported so far.

Arches, please stabilize =x11-libs/libXfont-1.4.7
Comment 3 Jeroen Roovers (RETIRED) gentoo-dev 2014-01-09 15:23:21 UTC
Stable for HPPA.
Comment 4 Agostino Sarubbo gentoo-dev 2014-01-12 13:18:05 UTC
ia64 stable
Comment 5 Markus Meier gentoo-dev 2014-01-12 21:04:51 UTC
arm stable
Comment 6 Agostino Sarubbo gentoo-dev 2014-01-16 20:16:07 UTC
amd64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2014-01-16 20:17:52 UTC
x86 stable
Comment 8 Agostino Sarubbo gentoo-dev 2014-01-17 20:43:32 UTC
ppc64 stable
Comment 9 Agostino Sarubbo gentoo-dev 2014-01-17 20:47:16 UTC
ppc stable
Comment 10 Agostino Sarubbo gentoo-dev 2014-01-18 20:17:56 UTC
alpha stable
Comment 11 Agostino Sarubbo gentoo-dev 2014-01-26 11:59:07 UTC
sparc stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 12 Chí-Thanh Christopher Nguyễn gentoo-dev 2014-01-26 16:28:21 UTC
Vulnerable versions have been removed.
Comment 13 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-01-26 16:33:28 UTC
added to existing glsa request
Comment 14 GLSAMaker/CVETool Bot gentoo-dev 2014-02-07 21:21:56 UTC
CVE-2013-6462 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6462):
  Stack-based buffer overflow in the bdfReadCharacters function in
  bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers
  to cause a denial of service (crash) or possibly execute arbitrary code via
  a long string in a character name in a BDF font file.
Comment 15 GLSAMaker/CVETool Bot gentoo-dev 2014-02-21 16:08:27 UTC
This issue was resolved and addressed in
 GLSA 201402-23 at http://security.gentoo.org/glsa/glsa-201402-23.xml
by GLSA coordinator Chris Reffett (creffett).