CVE-2023-0494
Publication date 7 February 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
Status
Package | Ubuntu Release | Status |
---|---|---|
xorg-server | ||
22.04 LTS jammy |
Fixed 2:21.1.3-2ubuntu2.7
|
|
20.04 LTS focal |
Fixed 2:1.20.13-1ubuntu1~20.04.6
|
|
18.04 LTS bionic |
Fixed 2:1.19.6-1ubuntu4.14
|
|
16.04 LTS xenial |
Fixed 2:1.18.4-0ubuntu0.12+esm5
|
|
14.04 LTS trusty |
Fixed 2:1.15.1-0ubuntu2.11+esm7
|
|
xorg-server-hwe-16.04 | ||
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Fixed 2:1.19.6-1ubuntu4.1~16.04.6+esm4
|
|
14.04 LTS trusty | Not in release | |
xorg-server-hwe-18.04 | ||
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 2:1.20.8-2ubuntu2.2~18.04.10
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
xorg-server-lts-utopic | ||
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Ignored end of standard support | |
xorg-server-lts-vivid | ||
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Ignored end of standard support | |
xorg-server-lts-wily | ||
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Ignored end of standard support | |
xorg-server-lts-xenial | ||
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Ignored end of standard support | |
xwayland | ||
22.04 LTS jammy |
Fixed 2:22.1.1-1ubuntu0.5
|
|
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
mdeslaur
xorg server is actually the xorg-server package the xorg package only contains docs xwayland package contains parts of xorg-server
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-5846-1
- X.Org X Server vulnerability
- 7 February 2023
- USN-5778-2
- X.Org X Server vulnerabilities
- 16 February 2023