|
Message-ID: <63fc7caa-6f5c-d45b-9cb6-aa9d56a3a243@oracle.com> Date: Tue, 7 Feb 2023 09:25:00 -0800 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com, Peter Hutterer <peter.hutterer@...hat.com> Subject: Re: X.Org Security Advisory: Security issue in the X server Fixes have been released now in: xorg-server 21.1.7: https://lists.x.org/archives/xorg-announce/2023-February/003321.html xwayland 22.1.8: https://lists.x.org/archives/xorg-announce/2023-February/003322.html -Alan Coopersmith- alan.coopersmith@...cle.com X.Org Security Response Team - xorg-security@...ts.x.org On 2/6/23 17:36, Peter Hutterer wrote: > X.Org Security Advisory: February 07, 2023 > > Security issue in the X server > ============================== > > This issue can lead to local privileges elevation on systems > where the X server is running privileged and remote code execution for > ssh X forwarding sessions. > > * CVE-2023-0494/ZDI-CAN-19596: X.Org Server DeepCopyPointerClasses > use-after-free > > A dangling pointer in DeepCopyPointerClasses can be exploited by > ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read/write into > freed memory. > > Patches > ------- > A patch for this issue has been committed to the xorg server git > repository. xorg-server 21.1.7 will be released shortly and will include > this patch. > > - commit 0ba6d8c37071131a49790243cdac55392ecf71ec > > Xi: fix potential use-after-free in DeepCopyPointerClasses > > CVE-2023-0494, ZDI-CAN 19596 > > > Thanks > ====== > > The vulnerabilities have been discovered by Jan-Niklas Sohn working with > Trend Micro Zero Day Initiative. >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.