An integer underflow flaw was found in the X.Org server when handling trapezoids. A malicious, authorized client could use this flaw to crash the X.Org server.
On Further investigation it was discovered that there may be a possibility of arbitrary user controlled code execution in this particular flaw. Security impact and the cvss2 scoring has been adjusted accordingly.
Created xorg-x11-server tracking bugs for this issue:
Affects: fedora-all [bug 1043751]
This issue has been addressed in following products:
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 5
Via RHSA-2013:1868 https://rhn.redhat.com/errata/RHSA-2013-1868.html