First published: Thu Apr 15 2010(Updated: )
A memory corruption flaw was discovered in Xorg X server's Render extension. Problem originally reported as Firefox crashing X server issue was tracked down to an incorrect calculation issue in mod() macro by Olivier Fourdan: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - Xorg crashes with latest firefox" href="show_bug.cgi?id=495733#c15">https://bugzilla.redhat.com/show_bug.cgi?id=495733#c15</a> This issue could cause mod() to return value greater than its second argument (the divisor), resulting in excessive read and write in Render composite operation, causing heap or video memory corruption.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.Org Server | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1166 is considered to have a moderate severity level due to potential crashes caused by memory corruption.
To fix CVE-2010-1166, upgrade the X.Org server to version 7.1 or later where the vulnerability has been addressed.
CVE-2010-1166 affects X.Org Server version 7.1.
CVE-2010-1166 can be exploited through denial of service attacks that cause the X server to crash.
CVE-2010-1166 was discovered in 2010, highlighting a memory corruption flaw in the X.Org X server.