First published: Sat Jan 18 2014(Updated: )
Integer underflow in the xTrapezoidValid macro in render/picture.h in X.Org allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | 2:1.20.11-1+deb11u13 2:1.20.11-1+deb11u15 2:21.1.7-3+deb12u9 2:21.1.16-1 | |
SUSE Libpixman-1-0 | <0.31.2 | |
Debian Linux | =6.0 | |
Debian Linux | =7.0 | |
openSUSE | =12.2 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2013-6424.
The severity of CVE-2013-6424 is medium.
The affected software includes Pixman, Debian Linux 6.0 and 7.0, OpenSUSE 12.2, 12.3, and 13.1, and Ubuntu Linux 12.04, 14.04, and 14.10.
A context-dependent attacker can exploit CVE-2013-6424 to cause a denial of service (crash) by providing a negative value for the bottom parameter in the xTrapezoidValid macro.
Yes, there are fixes available for CVE-2013-6424. Please refer to the references provided for more information on the available patches.