Unrated severityNVD Advisory· Published Mar 27, 2023· Updated Feb 24, 2025
CVE-2023-0494
CVE-2023-0494
Description
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
Affected products
49- X.Org/X.Orgdescription
- osv-coords48 versionspkg:rpm/almalinux/tigervncpkg:rpm/almalinux/tigervnc-iconspkg:rpm/almalinux/tigervnc-licensepkg:rpm/almalinux/tigervnc-selinuxpkg:rpm/almalinux/tigervnc-serverpkg:rpm/almalinux/tigervnc-server-minimalpkg:rpm/almalinux/tigervnc-server-modulepkg:rpm/almalinux/xorg-x11-server-commonpkg:rpm/almalinux/xorg-x11-server-develpkg:rpm/almalinux/xorg-x11-server-sourcepkg:rpm/almalinux/xorg-x11-server-Xdmxpkg:rpm/almalinux/xorg-x11-server-Xephyrpkg:rpm/almalinux/xorg-x11-server-Xnestpkg:rpm/almalinux/xorg-x11-server-Xorgpkg:rpm/almalinux/xorg-x11-server-Xvfbpkg:rpm/almalinux/xorg-x11-server-Xwaylandpkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/xwayland&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/xwayland&distro=openSUSE%20Tumbleweedpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP3pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Manager%20Server%204.2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/xorg-x11-server&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/xwayland&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP4
< 1.12.0-5.el9_1.1+ 47 more
- (no CPE)range: < 1.12.0-5.el9_1.1
- (no CPE)range: < 1.12.0-5.el9_1.1
- (no CPE)range: < 1.12.0-5.el9_1.1
- (no CPE)range: < 1.12.0-5.el9_1.1
- (no CPE)range: < 1.12.0-5.el9_1.1
- (no CPE)range: < 1.12.0-5.el9_1.1
- (no CPE)range: < 1.12.0-5.el9_1.1
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 1.20.11-17.el9
- (no CPE)range: < 21.1.3-7.el9
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 21.1.7-1.1
- (no CPE)range: < 21.1.4-150400.3.9.1
- (no CPE)range: < 22.1.8-1.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.20.3-150100.14.5.36.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.20.3-150400.38.16.1
- (no CPE)range: < 1.20.3-150400.38.16.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 7.6_1.18.3-76.60.1
- (no CPE)range: < 1.19.6-4.42.1
- (no CPE)range: < 1.19.6-10.43.1
- (no CPE)range: < 1.20.3-150100.14.5.36.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.19.6-4.42.1
- (no CPE)range: < 1.19.6-10.43.1
- (no CPE)range: < 1.20.3-150100.14.5.36.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.19.6-10.43.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.20.3-150200.22.5.66.1
- (no CPE)range: < 1.19.6-4.42.1
- (no CPE)range: < 1.19.6-4.42.1
- (no CPE)range: < 21.1.4-150400.3.9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.