CVE-2023-0494

A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 67%
VendorProductVersion
x.orgx_server
𝑥
< 21.1.7
redhatenterprise_linux
8.0
redhatenterprise_linux
8.1
redhatenterprise_linux
9.0
redhatenterprise_linux_aus
8.4
redhatenterprise_linux_aus
8.6
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_eus
8.4
redhatenterprise_linux_eus
8.6
redhatenterprise_linux_eus
9.0
redhatenterprise_linux_for_ibm_z_systems
7.0
redhatenterprise_linux_for_ibm_z_systems
8.0
redhatenterprise_linux_for_ibm_z_systems_eus
8.4
redhatenterprise_linux_for_ibm_z_systems_eus
8.6
redhatenterprise_linux_for_power_big_endian
7.0
redhatenterprise_linux_for_power_little_endian
7.0
redhatenterprise_linux_for_power_little_endian
8.0
redhatenterprise_linux_for_power_little_endian
9.0
redhatenterprise_linux_for_power_little_endian_eus
8.4
redhatenterprise_linux_for_power_little_endian_eus
8.6
redhatenterprise_linux_for_scientific_computing
7.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
8.2
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.1
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.2
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.4
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.6
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
9.0
redhatenterprise_linux_server_tus
8.2
redhatenterprise_linux_server_tus
8.4
redhatenterprise_linux_server_tus
8.6
redhatenterprise_linux_server_update_services_for_sap_solutions
8.2
redhatenterprise_linux_server_workstation
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xorg-server
bullseye
2:1.20.11-1+deb11u13
fixed
bullseye (security)
2:1.20.11-1+deb11u14
fixed
bookworm
2:21.1.7-3+deb12u8
fixed
bookworm (security)
2:21.1.7-3+deb12u8
fixed
sid
2:21.1.15-2
fixed
trixie
2:21.1.15-2
fixed
xwayland
bookworm
2:22.1.9-1
fixed
sid
2:24.1.4-2
fixed
trixie
2:24.1.4-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xorg-server
lunar
Fixed 2:21.1.7-1ubuntu1
released
kinetic
Fixed 2:21.1.4-2ubuntu1.5
released
jammy
Fixed 2:21.1.3-2ubuntu2.7
released
focal
Fixed 2:1.20.13-1ubuntu1~20.04.6
released
bionic
Fixed 2:1.19.6-1ubuntu4.14
released
xenial
Fixed 2:1.18.4-0ubuntu0.12+esm5
released
trusty
Fixed 2:1.15.1-0ubuntu2.11+esm7
released
xorg-server-hwe-16.04
kinetic
dne
jammy
dne
focal
dne
bionic
dne
xenial
Fixed 2:1.19.6-1ubuntu4.1~16.04.6+esm4
released
trusty
dne
xorg-server-hwe-18.04
kinetic
dne
jammy
dne
focal
dne
bionic
Fixed 2:1.20.8-2ubuntu2.2~18.04.10
released
xenial
dne
trusty
dne
xorg-server-lts-utopic
kinetic
dne
jammy
dne
focal
dne
bionic
dne
xenial
dne
trusty
ignored
xorg-server-lts-vivid
kinetic
dne
jammy
dne
focal
dne
bionic
dne
xenial
dne
trusty
ignored
xorg-server-lts-wily
kinetic
dne
jammy
dne
focal
dne
bionic
dne
xenial
dne
trusty
ignored
xorg-server-lts-xenial
kinetic
dne
jammy
dne
focal
dne
bionic
dne
xenial
dne
trusty
ignored
xwayland
lunar
Fixed 2:22.1.8-1
released
kinetic
Fixed 2:22.1.3-2ubuntu0.3
released
jammy
Fixed 2:22.1.1-1ubuntu0.5
released
focal
dne
bionic
dne
xenial
dne
trusty
dne