Unrated severityNVD Advisory· Published Jan 18, 2014· Updated Apr 29, 2026
CVE-2013-6425
CVE-2013-6425
Description
Integer underflow in the pixman_trapezoid_valid macro in pixman.h in Pixman before 0.32.0, as used in X.Org server and cairo, allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
Affected products
20cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- cgit.freedesktop.org/pixman/commit/nvdPatchThird Party Advisory
- lists.freedesktop.org/archives/pixman/2013-November/003109.htmlnvdPatchThird Party Advisory
- bugs.freedesktop.org/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1197921nvdIssue TrackingPatchThird Party Advisory
- lists.opensuse.org/opensuse-updates/2014-01/msg00001.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2014-01/msg00005.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2014-01/msg00008.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2014-01/msg00097.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2013-1869.htmlnvdThird Party Advisory
- www.debian.org/security/2013/dsa-2823nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2013/12/03/8nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2013/12/04/8nvdMailing ListThird Party Advisory
- www.ubuntu.com/usn/USN-2047-1nvdThird Party Advisory
News mentions
0No linked articles in our index yet.