U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2014-8093

Change History

CVE Modified by Red Hat, Inc. 2/12/2023 7:42:37 PM

Action Type Old Value New Value
Removed CVSS V2
Red Hat, Inc. (AV:A/AC:M/Au:S/C:C/I:C/A:C)

								
						
Changed Description
Multiple integer overflow flaws were found in the way the X.Org server calculated memory requirements for certain GLX extension requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server or, potentially, execute arbitrary code with root privileges.
Multiple integer overflows in the GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) __glXDisp_ReadPixels, (2) __glXDispSwap_ReadPixels, (3) __glXDisp_GetTexImage, (4) __glXDispSwap_GetTexImage, (5) GetSeparableFilter, (6) GetConvolutionFilter, (7) GetHistogram, (8) GetMinmax, (9) GetColorTable, (10) __glXGetAnswerBuffer, (11) __GLX_GET_ANSWER_BUFFER, (12) __glXMap1dReqSize, (13) __glXMap1fReqSize, (14) Map2Size, (15) __glXMap2dReqSize, (16) __glXMap2fReqSize, (17) __glXImageSize, or (18) __glXSeparableFilter2DReqSize function, which triggers an out-of-bounds read or write.
Removed Reference
https://access.redhat.com/errata/RHSA-2014:1982 [No Types Assigned]

								
						
Removed Reference
https://access.redhat.com/errata/RHSA-2014:1983 [No Types Assigned]

								
						
Removed Reference
https://access.redhat.com/security/cve/CVE-2014-8093 [No Types Assigned]

								
						
Removed Reference
https://bugzilla.redhat.com/show_bug.cgi?id=1168688 [No Types Assigned]