First published: Mon Nov 07 2022(Updated: )
A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051. Reference: <a href="https://vuldb.com/?id.211051">https://vuldb.com/?id.211051</a> Upstream patch: <a href="https://cgit.freedesktop.org/xorg/xserver/commit/?id=11beef0b7f1ed290348e45618e5fa0d2bffcb72e">https://cgit.freedesktop.org/xorg/xserver/commit/?id=11beef0b7f1ed290348e45618e5fa0d2bffcb72e</a>
Affected Software | Affected Version | How to fix |
---|---|---|
X.org X.org Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2140698 is classified as critical due to the potential for buffer overflow.
REDHAT-BUG-2140698 affects the X.org Server software.
To fix REDHAT-BUG-2140698, it is recommended to apply the latest patch provided by the maintainers.
REDHAT-BUG-2140698 is a buffer overflow vulnerability.
The function involved in REDHAT-BUG-2140698 is _GetCountedString in the file xkb/xkb.c.