First published: Fri Feb 13 2015(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.org Xorg-server | <=1.16.3 | |
X.org Xorg-server | =1.17.0 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
debian/xorg-server | 2:1.20.11-1+deb11u13 2:1.20.11-1+deb11u14 2:21.1.7-3+deb12u8 2:21.1.14-2 2:21.1.15-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0255 is a vulnerability in X.Org Server that allows remote attackers to obtain sensitive information from process memory or cause a denial of service (crash) via a crafted string length value in a XkbSetGeometry request.
The severity of CVE-2015-0255 is medium, with a severity value of 6.4.
X.Org Server versions before 1.16.3 and 1.17.x before 1.17.1 are affected by CVE-2015-0255.
To fix CVE-2015-0255, update X.Org Server to version 1.16.3 or apply the necessary security patches.
You can find more information about CVE-2015-0255 in the following references: - [CVE Mitre](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255) - [Openwall](http://www.openwall.com/lists/oss-security/2015/02/10/18) - [Ubuntu Security Notice](https://ubuntu.com/security/notices/USN-2500-1)