First published: Mon Oct 17 2022(Updated: )
A vulnerability, which was classified as problematic, has been found in X.org Server. Affected by this issue is the function ProcXkbGetKbdByName of the file xkb/xkb.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211052.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | <=2:1.20.4-1+deb10u4 | 2:1.20.4-1+deb10u9 2:1.20.11-1+deb11u6 2:21.1.7-3 2:21.1.8-1 |
debian/xwayland | 2:22.1.9-1 2:23.2.1-1 | |
X.Org X Server | <21.1.6 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-3551.
The severity of CVE-2022-3551 is medium with a CVSS score of 6.5.
X.org Server, Xwayland, Debian Linux (versions 10.0 and 11.0), and Fedora (versions 35, 36, and 37) are affected by CVE-2022-3551.
It is recommended to apply the relevant patches for xorg-server, xwayland, Debian Linux, and Fedora to fix CVE-2022-3551.
You can find more information about CVE-2022-3551 at the following references: [1](https://vuldb.com/?id.211052), [2](https://cgit.freedesktop.org/xorg/xserver/commit/?id=18f91b950e22c2a342a4fbc55e9ddf7534a707d2), [3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2140703).