ProcDbeSwapBuffers() and SProcDbeSwapBuffers() DBE extension calls do not check that the lengths and/or indexes sent by the client are within the bounds specified by the caller or the bounds of the memory allocated to hold the request read from the client, so could read or write past the bounds of allocated memory while processing the request. These calls all occur only after a client has successfully authenticated itself. Introduced in X11R6.1 (1996).
Created attachment 962137 [details] 0007-dbe_unvalidated_lengths_in_DbeSwapBuffers_calls_CVE-2014-8097.patch
Integer overflow causing OOB read and crash. Could also result in OOB data being sent to the client, resulting in potential information leaks.
External References: http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2014:1982 https://rhn.redhat.com/errata/RHSA-2014-1982.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 6 Via RHSA-2014:1983 https://rhn.redhat.com/errata/RHSA-2014-1983.html