CVE-2023-0494

EUVD-2023-12542
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 69%
Affected Products (NVD)
VendorProductVersion
x.orgx_server
𝑥
< 21.1.7
redhatenterprise_linux
8.0
redhatenterprise_linux
8.1
redhatenterprise_linux
9.0
redhatenterprise_linux_aus
8.4
redhatenterprise_linux_aus
8.6
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_eus
8.4
redhatenterprise_linux_eus
8.6
redhatenterprise_linux_eus
9.0
redhatenterprise_linux_for_ibm_z_systems
7.0
redhatenterprise_linux_for_ibm_z_systems
8.0
redhatenterprise_linux_for_ibm_z_systems_eus
8.4
redhatenterprise_linux_for_ibm_z_systems_eus
8.6
redhatenterprise_linux_for_power_big_endian
7.0
redhatenterprise_linux_for_power_little_endian
7.0
redhatenterprise_linux_for_power_little_endian
8.0
redhatenterprise_linux_for_power_little_endian
9.0
redhatenterprise_linux_for_power_little_endian_eus
8.4
redhatenterprise_linux_for_power_little_endian_eus
8.6
redhatenterprise_linux_for_scientific_computing
7.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
8.2
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.1
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.2
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.4
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.6
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
9.0
redhatenterprise_linux_server_tus
8.2
redhatenterprise_linux_server_tus
8.4
redhatenterprise_linux_server_tus
8.6
redhatenterprise_linux_server_update_services_for_sap_solutions
8.2
redhatenterprise_linux_server_workstation
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xorg-server
bookworm
2:21.1.7-3+deb12u8
fixed
bookworm (security)
2:21.1.7-3+deb12u8
fixed
bullseye
2:1.20.11-1+deb11u13
fixed
bullseye (security)
2:1.20.11-1+deb11u14
fixed
sid
2:21.1.15-2
fixed
trixie
2:21.1.15-2
fixed
xwayland
bookworm
2:22.1.9-1
fixed
sid
2:24.1.4-2
fixed
trixie
2:24.1.4-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xorg-server
bionic
Fixed 2:1.19.6-1ubuntu4.14
released
focal
Fixed 2:1.20.13-1ubuntu1~20.04.6
released
jammy
Fixed 2:21.1.3-2ubuntu2.7
released
kinetic
Fixed 2:21.1.4-2ubuntu1.5
released
lunar
Fixed 2:21.1.7-1ubuntu1
released
trusty
Fixed 2:1.15.1-0ubuntu2.11+esm7
released
xenial
Fixed 2:1.18.4-0ubuntu0.12+esm5
released
xorg-server-hwe-16.04
bionic
dne
focal
dne
jammy
dne
kinetic
dne
trusty
dne
xenial
Fixed 2:1.19.6-1ubuntu4.1~16.04.6+esm4
released
xorg-server-hwe-18.04
bionic
Fixed 2:1.20.8-2ubuntu2.2~18.04.10
released
focal
dne
jammy
dne
kinetic
dne
trusty
dne
xenial
dne
xorg-server-lts-utopic
bionic
dne
focal
dne
jammy
dne
kinetic
dne
trusty
ignored
xenial
dne
xorg-server-lts-vivid
bionic
dne
focal
dne
jammy
dne
kinetic
dne
trusty
ignored
xenial
dne
xorg-server-lts-wily
bionic
dne
focal
dne
jammy
dne
kinetic
dne
trusty
ignored
xenial
dne
xorg-server-lts-xenial
bionic
dne
focal
dne
jammy
dne
kinetic
dne
trusty
ignored
xenial
dne
xwayland
bionic
dne
focal
dne
jammy
Fixed 2:22.1.1-1ubuntu0.5
released
kinetic
Fixed 2:22.1.3-2ubuntu0.3
released
lunar
Fixed 2:22.1.8-1
released
trusty
dne
xenial
dne