First published: Mon Nov 07 2022(Updated: )
A vulnerability, which was classified as problematic, has been found in X.org Server. Affected by this issue is the function ProcXkbGetKbdByName of the file xkb/xkb.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211052. Reference: <a href="https://vuldb.com/?id.211052">https://vuldb.com/?id.211052</a> Upstream patch: <a href="https://cgit.freedesktop.org/xorg/xserver/commit/?id=18f91b950e22c2a342a4fbc55e9ddf7534a707d2">https://cgit.freedesktop.org/xorg/xserver/commit/?id=18f91b950e22c2a342a4fbc55e9ddf7534a707d2</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Xorg-x11-server-xorg |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2140701 is classified as problematic.
REDHAT-BUG-2140701 is caused by a memory leak in the ProcXkbGetKbdByName function of the X.org Server.
To fix REDHAT-BUG-2140701, it is recommended to apply the provided patch for the vulnerability.
The affected software for REDHAT-BUG-2140701 is X.org X Server.
The impact of REDHAT-BUG-2140701 is a potential memory leak that could lead to resource exhaustion.