{"id":"CVE-2022-3550","summary":"X.org Server xkb.c _GetCountedString buffer overflow","details":"A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051.","modified":"2026-05-18T05:55:46.602121156Z","published":"2022-10-17T00:00:00Z","related":["ALSA-2023:2248","ALSA-2023:2249","ALSA-2023:2805","ALSA-2023:2806","SUSE-SU-2022:3840-1","SUSE-SU-2022:3841-1","SUSE-SU-2022:3850-1","SUSE-SU-2022:3856-1","SUSE-SU-2022:3857-1","SUSE-SU-2022:3862-1","SUSE-SU-2022:3863-1","SUSE-SU-2022:3941-1","openSUSE-SU-2024:12427-1","openSUSE-SU-2024:12428-1"],"database_specific":{"cna_assigner":"VulDB","cwe_ids":["CWE-119"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3550.json"},"references":[{"type":"WEB","url":"https://cgit.freedesktop.org/xorg/xserver/commit/?id=11beef0b7f1ed290348e45618e5fa0d2bffcb72e"},{"type":"WEB","url":"https://vuldb.com/?id.211051"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3550.json"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QTPFVGYTOY4EWTJEBH3YGDTTU57FZAK/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IOEDFBYPSE3EMVHTEFCVEJD2R2Y5F2A5/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXZZ6JBDBVBYPDI6DUTY6N36GNW37YHK/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7W3NXSYK4P3XCZQBI3U6UWP4DPZIMRZ/"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3550"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202305-30"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5278"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00012.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/xorg/xserver","events":[{"introduced":"0"},{"fixed":"59b6fc88ed9f4b22397a568c2483e4c558856ffa"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"21.1.6"}],"cpe":"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["xorg-server-21.1.5","xorg-server-21.1.4","xorg-server-21.1.3","xorg-server-21.1.2","xorg-server-21.1.1","xorg-server-21.1.0","xorg-server-21.0.99.902","xorg-server-21.0.99.901","xorg-server-21.0.99.1","xorg-server-1.20.0","xorg-server-1.19.99.905","xorg-server-1.19.99.904","xorg-server-1.19.99.903","xorg-server-1.19.99.902","xorg-server-1.19.99.901","xorg-server-1.19.0","xorg-server-1.18.99.902","xorg-server-1.18.99.901","xorg-server-1.18.99.2","xorg-server-1.18.0","xorg-server-1.17.99.902","xorg-server-1.17.99.901","xorg-server-1.17.0","xorg-server-1.16.99.902","xorg-server-1.16.99.901","xorg-server-1.16.0","xorg-server-1.15.99.904","xorg-server-1.15.99.903","xorg-server-1.15.99.902","xorg-server-1.15.99.901","xorg-server-1.15.0","xorg-server-1.14.99.905","xorg-server-1.14.99.904","xorg-server-1.14.99.903","xorg-server-1.14.99.902","xorg-server-1.14.99.901","xorg-server-1.14.99.3","xorg-server-1.14.99.2","xorg-server-1.14.99.1","xorg-server-1.14.0","xorg-server-1.13.99.902","xorg-server-1.13.99.901","xorg-server-1.13.0","xorg-server-1.12.99.905","xorg-server-1.12.99.904","xorg-server-1.12.99.903","xorg-server-1.12.99.902","xorg-server-1.12.99.901","xorg-server-1.12.0","xorg-server-1.11.99.903","xorg-server-1.11.99.902","xorg-server-1.11.99.901","xorg-server-1.11.99.1","xorg-server-1.11.0","xorg-server-1.10.99.902","xorg-server-1.10.99.901","xorg-server-1.10.0","xorg-server-1.9.99.903","xorg-server-1.9.99.902","xorg-server-1.9.99.901","xorg-server-1.9.0","xorg-server-1.8.99.906","xorg-server-1.8.99.905","xorg-server-1.8.99.904","xorg-server-1.8.99.903","xorg-server-1.8.99.902","xorg-server-1.8.99.901","xorg-server-1.8.0","xorg-server-1.7.99.902","xorg-server-1.7.99.901","xorg-server-1.7.99.2","xorg-server-1.7.99.1","xorg-server-1.6.99.901","xorg-server-1.6.99.900","xorg-server-1.5.99.1","xorg-server-1.1.99.3","xorg-server-1_1_99_2","xorg-server-1_0_99_901","XORG-7_0_99_901","xorg-server-1_1_99_1","xorg-server-1_0_99_2","xorg-server-1_0_99_1","XORG-7_0","pre-xgldrop-merge","XORG-6_99_99_904","MODULAR_COPY","XORG-6_99_99_903","XORG-6_8_99_903","DRM-2_0_0","XORG-6_99_99_902","XORG-6_8_99_902","DRM-1_0_5","XORG-6_99_99_901","XORG-6_8_99_901","DRM-20051017","kdrive-initial-import","xorg-server-0_99_1","XORG-6_99_99_900","XORG-6_8_99_900","XORG-6_8_99_16","XORG-6_8_99_15","XORG-6_8_99_14","XORG-6_8_99_13","XORG-6_8_99_12","DRM-20050615","sco_port_update-base","XORG-6_8_99_11","XORG-6_8_99_10","XORG-6_8_99_9","XORG-6_8_99_8","XORG-6_8_99_7","XORG-6_8_99_6","XORG-6_8_99_5","XORG-6_8_99_4","XORG-6_8_99_3","XORG-6_8_99_2","XORG-6_8_99_1","lg3d-base","XORG-6_8_0","XORG-6_7_99_904","XORG-6_7_99_903","XORG-6_7_99_902","XORG-6_7_99_901","XORG-6_7_99_2","XORG-6_7_99_1","DRM-20040721","DRI-trunk-20040721","DRI-trunk-20040613","DRI-XFree86-4_3_99_12-merge","DRM-20040613","XACE-SELINUX-MERGE","xf86-4_4_99_1","xf86-4_4_0","xf86-4_3_99_903","xf86-4_3_99_903_special","add-Xi","xf86-012804-2330","xf86-4_3_99_902","xf86-4_3_99_901","dri-0-1-branchpoint","xf86-4_3_99_16","xf86-4_3_0_1","PRE_xf86-4_3_0_1","XORG-MAIN","xfixes_2_branchpoint","keithp","xf-4_3_99_6","xf-4_3_99_5","xf-4_3_99_4","xf-4_3_99_3","xf-4_3_99_2","xf-4_3_99_1","xf-4_3_0_1","xf-4_3_0","xf-4_2_99_902","xf-4_2_99_901","xf-4_2_99_4","xf-4_2_99_3","ah-20021030-postdri","xf-4_2_99_2","ah-20021030","dhd-20020916","xf-4_2_99_1","dri-20020222-merge","before-mesa-4_0-import","dri-20020129-merge","xf-4_2_1_1","xf-4_2_1","xf-4_2_0_1","xf-4_2_0-bindist-1","xf-4_2_0-bindist","xf-4_2_0","xf-4_2-bp","xf-4_1_99_7","xf-4_1_99_6","xf-4_1_99_5","xf-4_1_99_4","Domain-sync4","Domain-sync3","xf-4_1_99_3","xf-4_1_99_2","Domain-sync2","Domain-sync1","Domain-base","xf-4_1_99_1","dhd-20010817","xf-4_0_99_900","xf-4_0_99_3","xf-4_0_99_2","dhd-20010328","xf-4_0_99_1","xf-4_0_2-bindist","xf-4_0_2","xf-4_0_1Zc","xf-4_0_1Zb","pre-R651-import","xf-4_0_1Za","xf-4_0_1Z","xf-4_0_1h","xf-4_0_1g","xf-4_0_1f","xf-4_0_1e","xf-4_0_1d","xf-4_0_1c","xf-4_0_1b","xf-4_0g","xf-4_0f","xf-4_0e","xf-4_0d","xf-4_0c","xf-4_0_1a","xf-4_0_1-bindist","xf-4_0_1","xf-4_0Z","xf-4_0b","xf-4_0a","xf-4_0-bindist","xf-4_0","xf-3_9_18b","xf-3_9_18a","xf-3_9_18Za","xf-3_9_18Z","xf-3_9_18","xf-3_9_17f","xf-3_9_17e","xf-3_9_17d","xf-3_9_17c","xf-3_9_17b","xf-3_9_17a","xf-3_9_17Z","xf-3_9_17","xf-3_9_16Za","xf-3_9_16f","xf-3_9_16e","xf-3_9_16d","xf-3_9_16Z"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-3550.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}