U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.


Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2014-8103

Change History

CVE Modified by Red Hat, Inc. 2/02/2023 11:16:26 AM

Action Type Old Value New Value
Added CVSS V2

Red Hat, Inc. (AV:A/AC:M/Au:S/C:N/I:N/A:P)
Changed Description
X.Org Server (aka xserver and xorg-server) 1.15.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) sproc_dri3_query_version, (2) sproc_dri3_open, (3) sproc_dri3_pixmap_from_buffer, (4) sproc_dri3_buffer_from_pixmap, (5) sproc_dri3_fence_from_fd, (6) sproc_dri3_fd_from_fence, (7) proc_present_query_capabilities, (8) sproc_present_query_version, (9) sproc_present_pixmap, (10) sproc_present_notify_msc, (11) sproc_present_select_input, or (12) sproc_present_query_capabilities function in the (a) DRI3 or (b) Present extension.
Multiple out-of-bounds access flaws were found in the way the X.Org server calculated memory requirements for certain requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server.
Added Reference

https://access.redhat.com/errata/RHSA-2014:1983 [No Types Assigned]
Added Reference

https://access.redhat.com/security/cve/CVE-2014-8103 [No Types Assigned]
Added Reference

https://bugzilla.redhat.com/show_bug.cgi?id=1168716 [No Types Assigned]