Date: Sat, 6 Mar 2004 15:53:42 -0600 From: "Jacques A. Vidrine" <nectar@FreeBSD.org> To: Trevor Johnson <trevor@jpj.net> Cc: ports-committers@FreeBSD.org Subject: Re: cvs commit: ports/x11/linux-XFree86-libs Makefile distinfo.i386 Message-ID: <20040306215342.GA91865@madman.celabo.org> In-Reply-To: <20040306153749.R55348@blues.jpj.net> References: <200403041722.i24HMSLN083120@repoman.freebsd.org> <xzpvflhu3nf.fsf@dwp.des.no> <20040306153749.R55348@blues.jpj.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Mar 06, 2004 at 04:17:23PM -0500, Trevor Johnson wrote: > Dag-Erling [iso-8859-1] Smørgrav wrote: > > > Trevor Johnson <trevor@FreeBSD.org> writes: > > > Log: > > > Update to version 4.3.0-2.90.55 due to several security bugs > > > (discovered by iDefense and David Dawes) in the parsing of font > > > files and the font.alias file which can give root privileges to > > > local users. [...] > > > > This is pointless as the bug in question only affects the server. > > I hadn't noticed that--when I glanced at > <URL:ftp://ftp.xfree86.org/pub/XFree86/4.3.0/fixes/fontfile.diff>, which > addresses these bugs, it looked like the problem was in the X libraries, > not the server. [...] The bugs *are* in a library (libXfont), but one could only exploit them for privilege escalation in the server (which has libXfont compiled internally). I added linux-XFree86-libs to the VuXML entry describing this vulnerability (http://www.vuxml.org/freebsd/3837f462-5d6b-11d8-80e3-0020ed76ef5a.html) without thinking too much. Should I remove it? Cheers, -- Jacques Vidrine / nectar@celabo.org / jvidrine@verio.net / nectar@freebsd.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040306215342.GA91865>