DSA-5278-1 xorg-server -- security update

Related Vulnerabilities: CVE-2022-3550   CVE-2022-3551  

It was discovered that a buffer overflow in the _getCountedString() function of the Xorg X server may result in denial of service or potentially the execution of arbitrary code. For the stable distribution (bullseye), these problems have been fixed in version 2:1.20.11-1+deb11u3. We recommend that you upgrade your xorg-server packages. For the detailed security status of xorg-server please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xorg-server

Debian Security Advisory

DSA-5278-1 xorg-server -- security update

Date Reported:
13 Nov 2022
Affected Packages:
xorg-server
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2022-3550, CVE-2022-3551.
More information:

It was discovered that a buffer overflow in the _getCountedString() function of the Xorg X server may result in denial of service or potentially the execution of arbitrary code.

For the stable distribution (bullseye), these problems have been fixed in version 2:1.20.11-1+deb11u3.

We recommend that you upgrade your xorg-server packages.

For the detailed security status of xorg-server please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xorg-server