{"id":"UBUNTU-CVE-2014-8093","details":"Multiple integer overflows in the GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) __glXDisp_ReadPixels, (2) __glXDispSwap_ReadPixels, (3) __glXDisp_GetTexImage, (4) __glXDispSwap_GetTexImage, (5) GetSeparableFilter, (6) GetConvolutionFilter, (7) GetHistogram, (8) GetMinmax, (9) GetColorTable, (10) __glXGetAnswerBuffer, (11) __GLX_GET_ANSWER_BUFFER, (12) __glXMap1dReqSize, (13) __glXMap1fReqSize, (14) Map2Size, (15) __glXMap2dReqSize, (16) __glXMap2fReqSize, (17) __glXImageSize, or (18) __glXSeparableFilter2DReqSize function, which triggers an out-of-bounds read or write.","modified":"2026-01-30T00:39:30.583813Z","published":"2014-12-09T00:00:00Z","related":["USN-2436-1"],"upstream":["CVE-2014-8093"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-8093"},{"type":"REPORT","url":"http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2436-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-8093"}],"affected":[{"package":{"name":"xorg-server","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/xorg-server@2:1.15.1-0ubuntu2.4?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:1.15.1-0ubuntu2.4"}]}],"versions":["2:1.14.3-3ubuntu2","2:1.14.3-3ubuntu3","2:1.14.3-3ubuntu4","2:1.14.3-5ubuntu1","2:1.14.4-1ubuntu1","2:1.14.4-1ubuntu2","2:1.14.4.901-0ubuntu2","2:1.14.5-1ubuntu2","2:1.14.5-1ubuntu4","2:1.15.0-1ubuntu1","2:1.15.0-1ubuntu2","2:1.15.0-1ubuntu3","2:1.15.0-1ubuntu4","2:1.15.0-1ubuntu6","2:1.15.0-1ubuntu7","2:1.15.1-0ubuntu1","2:1.15.1-0ubuntu2","2:1.15.1-0ubuntu2.1"],"ecosystem_specific":{"binaries":[{"binary_name":"xdmx","binary_version":"2:1.15.1-0ubuntu2.4"},{"binary_name":"xdmx-tools","binary_version":"2:1.15.1-0ubuntu2.4"},{"binary_name":"xnest","binary_version":"2:1.15.1-0ubuntu2.4"},{"binary_name":"xorg-server-source","binary_version":"2:1.15.1-0ubuntu2.4"},{"binary_name":"xserver-common","binary_version":"2:1.15.1-0ubuntu2.4"},{"binary_name":"xserver-xephyr","binary_version":"2:1.15.1-0ubuntu2.4"},{"binary_name":"xserver-xorg-core","binary_version":"2:1.15.1-0ubuntu2.4"},{"binary_name":"xserver-xorg-dev","binary_version":"2:1.15.1-0ubuntu2.4"},{"binary_name":"xserver-xorg-xmir","binary_version":"2:1.15.1-0ubuntu2.4"},{"binary_name":"xvfb","binary_version":"2:1.15.1-0ubuntu2.4"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-8093.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}