First published: Tue Jan 31 2023(Updated: )
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xorg-server | <21.1.7 | 21.1.7 |
<21.1.7 | ||
=36 | ||
=37 | ||
=8.0 | ||
=8.1 | ||
=9.0 | ||
=8.4 | ||
=8.6 | ||
=7.0 | ||
=8.4 | ||
=8.6 | ||
=9.0 | ||
=7.0 | ||
=8.0 | ||
=8.4 | ||
=8.6 | ||
=7.0 | ||
=7.0 | ||
=8.0 | ||
=9.0 | ||
=8.4 | ||
=8.6 | ||
=7.0 | ||
=7.0 | ||
=8.2 | ||
=8.1 | ||
=8.2 | ||
=8.4 | ||
=8.6 | ||
=9.0 | ||
=8.2 | ||
=8.4 | ||
=8.6 | ||
=8.2 | ||
=7.0 | ||
X Window System | <21.1.7 | |
Fedora | =36 | |
Fedora | =37 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.1 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux | =8.4 | |
Red Hat Enterprise Linux | =8.6 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux Server EUS | =8.6 | |
Red Hat Enterprise Linux Server EUS | =9.0 | |
Red Hat Enterprise Linux for IBM Z Systems | =7.0 | |
Red Hat Enterprise Linux for IBM Z Systems | =8.0 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.4 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.6 | |
Red Hat Enterprise Linux for Power, big endian | =7.0 | |
Red Hat Enterprise Linux for Power, little endian | =7.0 | |
Red Hat Enterprise Linux for Power, little endian | =8.0 | |
Red Hat Enterprise Linux for Power, little endian | =9.0 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.4 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.6 | |
Red Hat Enterprise Linux for Scientific Computing | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.1 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.2 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.4 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.6 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =9.0 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.2 | |
Red Hat Enterprise Linux Server Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-0494 is high with a CVSS score of 7.8.
The software affected by CVE-2023-0494 includes X.Org X Server, xorg-server, and various versions of Fedora and Redhat Enterprise Linux.
CVE-2023-0494 can be exploited by using the ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() functions to read and write into freed memory, leading to local privilege elevation.
To fix CVE-2023-0494, update to version 21.1.7 of xorg-server.
More information about CVE-2023-0494 can be found in the X.Org announcement and the Redhat bugzilla links provided.