diff options
author | Repository QA checks <repo-qa-checks@gentoo.org> | 2017-11-11 21:44:51 +0000 |
---|---|---|
committer | Repository QA checks <repo-qa-checks@gentoo.org> | 2017-11-11 21:44:51 +0000 |
commit | 6c9e5d457e1a975066a44f380e9007f1339f6d5c (patch) | |
tree | fb21dfa5f9e547e66a52ddf3d5bdbf916df592ec /metadata/glsa/glsa-201711-08.xml | |
parent | Merge updates from master (diff) | |
parent | Add GLSA 201711-10 (diff) | |
download | gentoo-6c9e5d457e1a975066a44f380e9007f1339f6d5c.tar.gz gentoo-6c9e5d457e1a975066a44f380e9007f1339f6d5c.tar.bz2 gentoo-6c9e5d457e1a975066a44f380e9007f1339f6d5c.zip |
Merge commit '711052638906820458ee7059a25ac28c7e04ad40'
Diffstat (limited to 'metadata/glsa/glsa-201711-08.xml')
-rw-r--r-- | metadata/glsa/glsa-201711-08.xml | 65 |
1 files changed, 65 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-201711-08.xml b/metadata/glsa/glsa-201711-08.xml new file mode 100644 index 000000000000..b02d041603ad --- /dev/null +++ b/metadata/glsa/glsa-201711-08.xml @@ -0,0 +1,65 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201711-08"> + <title>LibXfont, LibXfont2: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in LibXfont and Libxfont2, + the worst of which could allow attackers to cause a Denial of Service + condition. + </synopsis> + <product type="ebuild">libxfont,libxfont2</product> + <announced>2017-11-11</announced> + <revised>2017-11-11: 1</revised> + <bug>634044</bug> + <access>local</access> + <affected> + <package name="x11-libs/libXfont2" auto="yes" arch="*"> + <unaffected range="ge">2.0.2</unaffected> + <vulnerable range="lt">2.0.2</vulnerable> + </package> + <package name="x11-libs/libXfont" auto="yes" arch="*"> + <unaffected range="ge">1.5.3</unaffected> + <vulnerable range="lt">1.5.3</vulnerable> + </package> + </affected> + <background> + <p>X.Org Xfont library</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in LibXfont and LibXfont2. + Please review the referenced CVE identifiers for details. + </p> + </description> + <impact type="normal"> + <p>Local attackers could obtain sensitive information or possibly cause a + Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All LibXfont2 users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/libXfont2-2.0.2" + </code> + + <p>All LibXfont users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/libXfont-1.5.3" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13720"> + CVE-2017-13720 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13722"> + CVE-2017-13722 + </uri> + </references> + <metadata tag="requester" timestamp="2017-11-04T15:44:47Z">jmbailey</metadata> + <metadata tag="submitter" timestamp="2017-11-11T15:02:42Z">jmbailey</metadata> +</glsa> |