{"id":"MGASA-2014-0278","summary":"Updated libxfont packages fix security vulnerabilities","details":"Ilja van Sprundel discovered that libXfont incorrectly handled font\nmetadata file parsing. A local attacker could use this issue to cause\nlibXfont to crash, or possibly execute arbitrary code in order to gain\nprivileges (CVE-2014-0209).\n\nIlja van Sprundel discovered that libXfont incorrectly handled X Font\nServer replies. A malicious font server could return specially-crafted\ndata that could cause libXfont to crash, or possibly execute arbitrary\ncode (CVE-2014-0210, CVE-2014-0211).\n","modified":"2026-04-16T00:10:53.563751286Z","published":"2014-07-04T17:51:51Z","upstream":["CVE-2014-0209","CVE-2014-0210","CVE-2014-0211"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0278.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=13373"},{"type":"WEB","url":"http://www.ubuntu.com/usn/usn-2211-1/"},{"type":"WEB","url":"http://lists.x.org/archives/xorg-announce/2014-May/002431.html"}],"affected":[{"package":{"name":"libxfont","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/libxfont?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.5-3.2.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0278.json"}},{"package":{"name":"libxfont","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/libxfont?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.7-1.1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0278.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}