Unrated severityNVD Advisory· Published Oct 17, 2022· Updated Apr 15, 2025
X.org Server xkb.c _GetCountedString buffer overflow
CVE-2022-3550
Description
A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051.
Affected products
50- osv-coords49 versionspkg:rpm/almalinux/xorg-x11-server-commonpkg:rpm/almalinux/xorg-x11-server-develpkg:rpm/almalinux/xorg-x11-server-sourcepkg:rpm/almalinux/xorg-x11-server-Xdmxpkg:rpm/almalinux/xorg-x11-server-Xephyrpkg:rpm/almalinux/xorg-x11-server-Xnestpkg:rpm/almalinux/xorg-x11-server-Xorgpkg:rpm/almalinux/xorg-x11-server-Xvfbpkg:rpm/almalinux/xorg-x11-server-Xwaylandpkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/xwayland&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/xwayland&distro=openSUSE%20Tumbleweedpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCLpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP3pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Manager%20Proxy%204.1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Manager%20Server%204.1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/xorg-x11-server&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/xwayland&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP4
< 1.20.11-17.el9+ 48 more
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 21.1.3-7.el9
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 21.1.4-2.1
- (no CPE)range: < 21.1.4-150400.3.3.1
- (no CPE)range: < 22.1.3-2.1
- (no CPE)range: < 1.20.3-150100.14.5.28.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.20.3-150100.14.5.28.1
- (no CPE)range: < 1.20.3-150100.14.5.28.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.19.6-150000.8.42.1
- (no CPE)range: < 1.19.6-150000.8.42.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.20.3-150400.38.8.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.20.3-150400.38.8.1
- (no CPE)range: < 7.6_1.18.3-76.52.1
- (no CPE)range: < 7.6_1.18.3-76.52.1
- (no CPE)range: < 1.19.6-4.34.1
- (no CPE)range: < 1.19.6-10.35.1
- (no CPE)range: < 1.20.3-150100.14.5.28.1
- (no CPE)range: < 1.20.3-150100.14.5.28.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.19.6-150000.8.42.1
- (no CPE)range: < 1.19.6-4.34.1
- (no CPE)range: < 1.19.6-10.35.1
- (no CPE)range: < 1.19.6-150000.8.42.1
- (no CPE)range: < 1.20.3-150100.14.5.28.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.19.6-10.35.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.20.3-150200.22.5.58.1
- (no CPE)range: < 1.19.6-4.34.1
- (no CPE)range: < 1.19.6-4.34.1
- (no CPE)range: < 21.1.4-150400.3.3.1
- X.org/Serverv5Range: n/a
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QTPFVGYTOY4EWTJEBH3YGDTTU57FZAK/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IOEDFBYPSE3EMVHTEFCVEJD2R2Y5F2A5/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXZZ6JBDBVBYPDI6DUTY6N36GNW37YHK/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7W3NXSYK4P3XCZQBI3U6UWP4DPZIMRZ/mitrevendor-advisory
- security.gentoo.org/glsa/202305-30mitrevendor-advisory
- www.debian.org/security/2022/dsa-5278mitrevendor-advisory
- lists.debian.org/debian-lts-announce/2022/11/msg00012.htmlmitremailing-list
- cgit.freedesktop.org/xorg/xserver/commit/mitre
- vuldb.commitre
News mentions
0No linked articles in our index yet.