Bug 2165995 (CVE-2023-0494) - CVE-2023-0494 xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
Summary: CVE-2023-0494 xorg-x11-server: DeepCopyPointerClasses use-after-free leads to...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2023-0494
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2166513 2166532 2166972 2166973 2166974 2166975 2166976 2166977 2167053 2167054 2167055 2167056 2167057 2167058 2167059 2167060 2167061 2167566 2167567 2167568 2167569
Blocks: 2165992
TreeView+ depends on / blocked
 
Reported: 2023-01-31 16:25 UTC by Patrick Del Bello
Modified: 2024-04-17 14:08 UTC (History)
7 users (show)

Fixed In Version: xorg-server 21.1.7
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
Clone Of:
Environment:
Last Closed: 2023-02-11 17:10:01 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:0622 0 None None None 2023-02-07 15:26:11 UTC
Red Hat Product Errata RHSA-2023:0623 0 None None None 2023-02-07 15:30:42 UTC
Red Hat Product Errata RHSA-2023:0662 0 None None None 2023-02-08 11:08:48 UTC
Red Hat Product Errata RHSA-2023:0663 0 None None None 2023-02-08 11:08:54 UTC
Red Hat Product Errata RHSA-2023:0664 0 None None None 2023-02-08 11:07:54 UTC
Red Hat Product Errata RHSA-2023:0665 0 None None None 2023-02-08 11:07:35 UTC
Red Hat Product Errata RHSA-2023:0671 0 None None None 2023-02-08 15:31:47 UTC
Red Hat Product Errata RHSA-2023:0675 0 None None None 2023-02-08 19:54:30 UTC
Red Hat Product Errata RHSA-2023:2248 0 None None None 2023-05-09 07:22:10 UTC
Red Hat Product Errata RHSA-2023:2249 0 None None None 2023-05-09 07:22:30 UTC
Red Hat Product Errata RHSA-2023:2805 0 None None None 2023-05-16 08:15:13 UTC
Red Hat Product Errata RHSA-2023:2806 0 None None None 2023-05-16 08:15:26 UTC

Description Patrick Del Bello 2023-01-31 16:25:04 UTC
* CVE-2023-0494/ZDI-CAN-19596: X.Org Server DeepCopyPointerClasses 
use-after-free

A dangling pointer in DeepCopyPointerClasses can be exploited by 
ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read/write into 
freed memory.

Comment 11 Peter Hutterer 2023-02-07 01:27:54 UTC
This issue is no longer embargoed, see the xorg security advisory here: https://lists.x.org/archives/xorg-announce/2023-February/003320.html

Comment 12 Sandipan Roy 2023-02-07 04:22:02 UTC
Created tigervnc tracking bugs for this issue:

Affects: fedora-36 [bug 2167568]
Affects: fedora-37 [bug 2167569]


Created xorg-x11-server tracking bugs for this issue:

Affects: fedora-all [bug 2167566]


Created xorg-x11-server-Xwayland tracking bugs for this issue:

Affects: fedora-all [bug 2167567]

Comment 13 errata-xmlrpc 2023-02-07 15:26:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:0622 https://access.redhat.com/errata/RHSA-2023:0622

Comment 14 errata-xmlrpc 2023-02-07 15:30:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:0623 https://access.redhat.com/errata/RHSA-2023:0623

Comment 15 errata-xmlrpc 2023-02-08 11:07:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:0665 https://access.redhat.com/errata/RHSA-2023:0665

Comment 16 errata-xmlrpc 2023-02-08 11:07:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2023:0664 https://access.redhat.com/errata/RHSA-2023:0664

Comment 17 errata-xmlrpc 2023-02-08 11:08:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:0662 https://access.redhat.com/errata/RHSA-2023:0662

Comment 18 errata-xmlrpc 2023-02-08 11:08:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:0663 https://access.redhat.com/errata/RHSA-2023:0663

Comment 19 errata-xmlrpc 2023-02-08 15:31:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:0671 https://access.redhat.com/errata/RHSA-2023:0671

Comment 20 errata-xmlrpc 2023-02-08 19:54:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:0675 https://access.redhat.com/errata/RHSA-2023:0675

Comment 21 Product Security DevOps Team 2023-02-11 17:09:58 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-0494

Comment 22 errata-xmlrpc 2023-05-09 07:22:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2248 https://access.redhat.com/errata/RHSA-2023:2248

Comment 23 errata-xmlrpc 2023-05-09 07:22:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2249 https://access.redhat.com/errata/RHSA-2023:2249

Comment 24 errata-xmlrpc 2023-05-16 08:15:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2805 https://access.redhat.com/errata/RHSA-2023:2805

Comment 25 errata-xmlrpc 2023-05-16 08:15:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2806 https://access.redhat.com/errata/RHSA-2023:2806


Note You need to log in before you can comment on or make changes to this bug.