Release Date: | 2014-12-09 |
Multiple integer overflow flaws were found in the way the X.Org server calculated memory requirements for certain GLX extension requests. A malicious, authenticated client could use either of these flaws to crash the X.Org server or, potentially, execute arbitrary code with root privileges.
See more information about CVE-2014-8093 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.
Base Score: | 7.4 | Base Metrics: | AV:A/AC:M/Au:S/C:C/I:C/A:C |
Access Vector: | Adjacent network | Attack Complexity: | Medium |
Authentication: | Requires single instance | Confidentiality Impact: | Complete |
Integrity Impact: | Complete | Availability Impact: | Complete |
Platform | Errata | Release Date |
Oracle Linux version 5 (xorg-x11-server) | ELSA-2014-1982 | 2014-12-11 |
Oracle Linux version 6 (xorg-x11-server) | ELSA-2014-1983 | 2014-12-11 |
Oracle Linux version 7 (xorg-x11-server) | ELSA-2014-1983 | 2014-12-11 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team