{"schema_version":"1.7.2","id":"OESA-2022-2110","modified":"2022-11-25T11:04:38Z","published":"2022-11-25T11:04:38Z","upstream":["CVE-2022-3553","CVE-2022-3551"],"summary":"xorg-x11-server security update","details":"X.Org X11 X server\r\n\r\nSecurity Fix(es):\r\n\r\nA vulnerability, which was classified as problematic, was found in X.org Server. This affects an unknown part of the file hw/xquartz/X11Controller.m of the component xquartz. The manipulation leads to denial of service. It is recommended to apply a patch to fix this issue. The identifier VDB-211053 was assigned to this vulnerability.(CVE-2022-3553)\r\n\r\nA vulnerability, which was classified as problematic, has been found in X.org Server. Affected by this issue is the function ProcXkbGetKbdByName of the file xkb/xkb.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211052.(CVE-2022-3551)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"xorg-x11-server","purl":"pkg:rpm/openEuler/xorg-x11-server\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.20.8-12.oe1"}]}],"ecosystem_specific":{"aarch64":["xorg-x11-server-devel-1.20.8-12.oe1.aarch64.rpm","xorg-x11-server-debuginfo-1.20.8-12.oe1.aarch64.rpm","xorg-x11-server-Xephyr-1.20.8-12.oe1.aarch64.rpm","xorg-x11-server-1.20.8-12.oe1.aarch64.rpm","xorg-x11-server-debugsource-1.20.8-12.oe1.aarch64.rpm"],"noarch":["xorg-x11-server-help-1.20.8-12.oe1.noarch.rpm"],"src":["xorg-x11-server-1.20.8-12.oe1.src.rpm"],"x86_64":["xorg-x11-server-debuginfo-1.20.8-12.oe1.x86_64.rpm","xorg-x11-server-Xephyr-1.20.8-12.oe1.x86_64.rpm","xorg-x11-server-debugsource-1.20.8-12.oe1.x86_64.rpm","xorg-x11-server-devel-1.20.8-12.oe1.x86_64.rpm","xorg-x11-server-1.20.8-12.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"xorg-x11-server","purl":"pkg:rpm/openEuler/xorg-x11-server\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.20.8-13.oe1"}]}],"ecosystem_specific":{"aarch64":["xorg-x11-server-1.20.8-13.oe1.aarch64.rpm","xorg-x11-server-devel-1.20.8-13.oe1.aarch64.rpm","xorg-x11-server-debugsource-1.20.8-13.oe1.aarch64.rpm","xorg-x11-server-debuginfo-1.20.8-13.oe1.aarch64.rpm","xorg-x11-server-Xephyr-1.20.8-13.oe1.aarch64.rpm"],"noarch":["xorg-x11-server-help-1.20.8-13.oe1.noarch.rpm"],"src":["xorg-x11-server-1.20.8-13.oe1.src.rpm"],"x86_64":["xorg-x11-server-debugsource-1.20.8-13.oe1.x86_64.rpm","xorg-x11-server-1.20.8-13.oe1.x86_64.rpm","xorg-x11-server-devel-1.20.8-13.oe1.x86_64.rpm","xorg-x11-server-debuginfo-1.20.8-13.oe1.x86_64.rpm","xorg-x11-server-Xephyr-1.20.8-13.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS","name":"xorg-x11-server","purl":"pkg:rpm/openEuler/xorg-x11-server\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.20.11-12.oe2203"}]}],"ecosystem_specific":{"aarch64":["xorg-x11-server-debugsource-1.20.11-12.oe2203.aarch64.rpm","xorg-x11-server-Xephyr-1.20.11-12.oe2203.aarch64.rpm","xorg-x11-server-Xvfb-1.20.11-12.oe2203.aarch64.rpm","xorg-x11-server-devel-1.20.11-12.oe2203.aarch64.rpm","xorg-x11-server-1.20.11-12.oe2203.aarch64.rpm","xorg-x11-server-Xnest-1.20.11-12.oe2203.aarch64.rpm","xorg-x11-server-debuginfo-1.20.11-12.oe2203.aarch64.rpm","xorg-x11-server-Xdmx-1.20.11-12.oe2203.aarch64.rpm","xorg-x11-server-common-1.20.11-12.oe2203.aarch64.rpm"],"noarch":["xorg-x11-server-help-1.20.11-12.oe2203.noarch.rpm","xorg-x11-server-source-1.20.11-12.oe2203.noarch.rpm"],"src":["xorg-x11-server-1.20.11-12.oe2203.src.rpm"],"x86_64":["xorg-x11-server-Xnest-1.20.11-12.oe2203.x86_64.rpm","xorg-x11-server-Xephyr-1.20.11-12.oe2203.x86_64.rpm","xorg-x11-server-debugsource-1.20.11-12.oe2203.x86_64.rpm","xorg-x11-server-Xvfb-1.20.11-12.oe2203.x86_64.rpm","xorg-x11-server-debuginfo-1.20.11-12.oe2203.x86_64.rpm","xorg-x11-server-devel-1.20.11-12.oe2203.x86_64.rpm","xorg-x11-server-Xdmx-1.20.11-12.oe2203.x86_64.rpm","xorg-x11-server-1.20.11-12.oe2203.x86_64.rpm","xorg-x11-server-common-1.20.11-12.oe2203.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2110"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3553"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3551"}],"database_specific":{"severity":"High"}}