CVE-2022-3550
17.10.2022, 13:15
A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051.
Vendor | Product | Version |
---|---|---|
x.org | x_server | 𝑥 < 21.1.6 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
xorg-server |
| ||||||||||||||
xorg-server-hwe-16.04 |
| ||||||||||||||
xorg-server-hwe-18.04 |
| ||||||||||||||
xorg-server-lts-utopic |
| ||||||||||||||
xorg-server-lts-vivid |
| ||||||||||||||
xorg-server-lts-wily |
| ||||||||||||||
xorg-server-lts-xenial |
| ||||||||||||||
xwayland |
|
Common Weakness Enumeration
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory BufferThe software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
References