|
Message-ID: <9afca616-11f3-ac36-4d5f-918487e1a756@redhat.com> Date: Tue, 7 Feb 2023 11:36:35 +1000 From: Peter Hutterer <peter.hutterer@...hat.com> To: oss-security@...ts.openwall.com Subject: X.Org Security Advisory: Security issue in the X server X.Org Security Advisory: February 07, 2023 Security issue in the X server ============================== This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. * CVE-2023-0494/ZDI-CAN-19596: X.Org Server DeepCopyPointerClasses use-after-free A dangling pointer in DeepCopyPointerClasses can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read/write into freed memory. Patches ------- A patch for this issue has been committed to the xorg server git repository. xorg-server 21.1.7 will be released shortly and will include this patch. - commit 0ba6d8c37071131a49790243cdac55392ecf71ec Xi: fix potential use-after-free in DeepCopyPointerClasses CVE-2023-0494, ZDI-CAN 19596 Thanks ====== The vulnerabilities have been discovered by Jan-Niklas Sohn working with Trend Micro Zero Day Initiative.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.