Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-3550

Опубликовано: 17 окт. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5.5

Описание

A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051.

РелизСтатусПримечание
bionic

released

2:1.19.6-1ubuntu4.12
devel

released

2:21.1.5-1ubuntu1
esm-infra-legacy/trusty

not-affected

2:1.15.1-0ubuntu2.11+esm6
esm-infra/bionic

not-affected

2:1.19.6-1ubuntu4.12
esm-infra/focal

not-affected

2:1.20.13-1ubuntu1~20.04.4
esm-infra/xenial

released

2:1.18.4-0ubuntu0.12+esm4
focal

released

2:1.20.13-1ubuntu1~20.04.4
jammy

released

2:21.1.3-2ubuntu2.3
kinetic

released

2:21.1.4-2ubuntu1.1
lunar

released

2:21.1.5-1ubuntu1

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra/focal

DNE

esm-infra/xenial

released

2:1.19.6-1ubuntu4.1~16.04.6+esm3
focal

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

trusty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

released

2:1.20.8-2ubuntu2.2~18.04.8
devel

DNE

esm-infra/bionic

not-affected

2:1.20.8-2ubuntu2.2~18.04.8
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

trusty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

trusty

ignored

end of standard support
upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

trusty

ignored

end of standard support
upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

trusty

ignored

end of standard support
upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

trusty

ignored

end of standard support
upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

2:22.1.5-1
esm-infra/focal

DNE

focal

DNE

jammy

released

2:22.1.1-1ubuntu0.3
kinetic

released

2:22.1.3-2ubuntu0.1
lunar

not-affected

2:22.1.5-1
trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

EPSS

Процентиль: 47%
0.00241
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
redhat
почти 3 года назад

A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051.

CVSS3: 5.5
nvd
почти 3 года назад

A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051.

CVSS3: 5.5
debian
почти 3 года назад

A vulnerability classified as critical was found in X.org Server. Affe ...

CVSS3: 9.8
github
почти 3 года назад

A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051.

CVSS3: 8.8
fstec
около 3 лет назад

Уязвимость функции GetCountedString компонента xkb/xkb.c реализации сервера X Window System X.Org Server, реализации протокола Wayland для X.Org XWayland, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 47%
0.00241
Низкий

5.5 Medium

CVSS3

Уязвимость CVE-2022-3550