CVE-2023-0494

Summary

CVECVE-2023-0494
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-03-27 21:15:00 UTC
Updated2023-05-30 06:16:00 UTC
DescriptionA vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.

Risk And Classification

Problem Types: CWE-416

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Fedoraproject Fedora 36 All All All
Operating System Fedoraproject Fedora 37 All All All
Operating System Redhat Enterprise Linux 8.0 All All All
Operating System Redhat Enterprise Linux 8.1 All All All
Operating System Redhat Enterprise Linux 9.0 All All All
Operating System Redhat Enterprise Linux Aus 8.4 All All All
Operating System Redhat Enterprise Linux Aus 8.6 All All All
Operating System Redhat Enterprise Linux Desktop 7.0 All All All
Operating System Redhat Enterprise Linux Eus 8.4 All All All
Operating System Redhat Enterprise Linux Eus 8.6 All All All
Operating System Redhat Enterprise Linux Eus 9.0 All All All
Operating System Redhat Enterprise Linux For Ibm Z Systems 7.0 All All All
Operating System Redhat Enterprise Linux For Ibm Z Systems 8.0 All All All
Operating System Redhat Enterprise Linux For Ibm Z Systems Eus 8.4 All All All
Operating System Redhat Enterprise Linux For Ibm Z Systems Eus 8.6 All All All
Operating System Redhat Enterprise Linux For Power Big Endian 7.0 All All All
Operating System Redhat Enterprise Linux For Power Little Endian 7.0 All All All
Operating System Redhat Enterprise Linux For Power Little Endian 8.0 All All All
Operating System Redhat Enterprise Linux For Power Little Endian 9.0 All All All
Operating System Redhat Enterprise Linux For Power Little Endian Eus 8.4 All All All
Operating System Redhat Enterprise Linux For Power Little Endian Eus 8.6 All All All
Operating System Redhat Enterprise Linux For Scientific Computing 7.0 All All All
Operating System Redhat Enterprise Linux Server 7.0 All All All
Operating System Redhat Enterprise Linux Server Aus 8.2 All All All
Operating System Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.1 All All All
Operating System Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.2 All All All
Operating System Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.4 All All All
Operating System Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.6 All All All
Operating System Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 9.0 All All All
Operating System Redhat Enterprise Linux Server Tus 8.2 All All All
Operating System Redhat Enterprise Linux Server Tus 8.4 All All All
Operating System Redhat Enterprise Linux Server Tus 8.6 All All All
Operating System Redhat Enterprise Linux Server Update Services For Sap Solutions 8.2 All All All
Operating System Redhat Enterprise Linux Server Workstation 7.0 All All All
Application X.org X Server All All All All

References

ReferenceSourceLinkTags
Xi: fix potential use-after-free in DeepCopyPointerClasses (0ba6d8c3) · Commits · xorg / xserver · GitLab MISC gitlab.freedesktop.org
X.Org X server, XWayland: Multiple Vulnerabilities (GLSA 202305-30) — Gentoo security GENTOO security.gentoo.org
X.Org Security Advisory: Security issue in the X server MISC lists.x.org
2165995 – (CVE-2023-0494) CVE-2023-0494 xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation MISC bugzilla.redhat.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 160451 Oracle Enterprise Linux Security Update for tigervnc (ELSA-2023-0622)
  • 160452 Oracle Enterprise Linux Security Update for tigervnc (ELSA-2023-0662)
  • 160455 Oracle Enterprise Linux Security Update for tigervnc and xorg-x11-server (ELSA-2023-0675)
  • 160631 Oracle Enterprise Linux Security Update for xorg-x11-server (ELSA-2023-2248)
  • 160633 Oracle Enterprise Linux Security Update for xorg-x11-server-xwayland (ELSA-2023-2249)
  • 160677 Oracle Enterprise Linux Security Update for xorg-x11-server-xwayland (ELSA-2023-2805)
  • 160679 Oracle Enterprise Linux Security Update for xorg-x11-server (ELSA-2023-2806)
  • 181545 Debian Security Update for xorg-server (DSA 5342-1)
  • 181564 Debian Security Update for xorg-server (DLA 3310-1)
  • 183751 Debian Security Update for xwaylandxorg-server (CVE-2023-0494)
  • 199149 Ubuntu Security Notification for X.Org X Server Vulnerability (USN-5846-1)
  • 199494 Ubuntu Security Notification for X.Org X Server Vulnerabilities (USN-5778-2)
  • 241169 Red Hat Update for tigervnc (RHSA-2023:0623)
  • 241176 Red Hat Update for tigervnc (RHSA-2023:0622)
  • 241177 Red Hat Update for tigervnc (RHSA-2023:0663)
  • 241178 Red Hat Update for tigervnc (RHSA-2023:0662)
  • 241179 Red Hat Update for tigervnc (RHSA-2023:0664)
  • 241182 Red Hat Update for tigervnc and xorg-x11-server (RHSA-2023:0675)
  • 241415 Red Hat Update for xorg-x11-server (RHSA-2023:2248)
  • 241448 Red Hat Update for xorg-x11-server-xwayland (RHSA-2023:2249)
  • 241510 Red Hat Update for xorg-x11-server (RHSA-2023:2806)
  • 241537 Red Hat Update for xorg-x11-server-xwayland (RHSA-2023:2805)
  • 241624 Red Hat Update for tigervnc (RHSA-2023:0671)
  • 241660 Red Hat Update for tigervnc (RHSA-2023:0665)
  • 257221 CentOS Security Update for tigervnc (CESA-2023:0675)
  • 283699 Fedora Security Update for xorg (FEDORA-2023-83b2d37c6a)
  • 283703 Fedora Security Update for tigervnc (FEDORA-2023-4d443bd03f)
  • 283704 Fedora Security Update for xorg (FEDORA-2023-d33a0f8471)
  • 283737 Fedora Security Update for xorg (FEDORA-2023-fb5022e741)
  • 283738 Fedora Security Update for xorg (FEDORA-2023-1ebf4507df)
  • 284279 Fedora Security Update for tigervnc (FEDORA-2023-c41e8f24bb)
  • 296099 Oracle Solaris 11.4 Support Repository Update (SRU) 57.144.3 Missing (CPUAPR2023)
  • 354800 Amazon Linux Security Advisory for xorg-x11-server : ALAS2-2023-1982
  • 354840 Amazon Linux Security Advisory for xorg-x11-server : ALAS-2023-1702
  • 355067 Amazon Linux Security Advisory for xorg-x11-server : AL2012-2023-391
  • 355107 Amazon Linux Security Advisory for tigervnc : ALAS-2023-1746
  • 355245 Amazon Linux Security Advisory for xorg-x11-server : ALAS2023-2023-131
  • 377994 Alibaba Cloud Linux Security Update for tigervnc and xorg-x11-server (ALINUX2-SA-2023:0010)
  • 377998 Alibaba Cloud Linux Security Update for tigervnc (ALINUX3-SA-2023:0022)
  • 378649 Alibaba Cloud Linux Security Update for xorg-x11-server (ALINUX3-SA-2023:0062)
  • 379627 Alibaba Cloud Linux Security Update for xorg-x11-server-xwayland (ALINUX3-SA-2024:0044)
  • 502972 Alpine Linux Security Update for xorg-server
  • 502975 Alpine Linux Security Update for xwayland
  • 505839 Alpine Linux Security Update for xorg-server
  • 505842 Alpine Linux Security Update for xwayland
  • 673016 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2023-1989)
  • 673026 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2023-1967)
  • 673075 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2023-2180)
  • 673084 EulerOS Security Update for tigervnc (EulerOS-SA-2023-2176)
  • 673158 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2023-2281)
  • 673161 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2023-2305)
  • 673396 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2024-1210)
  • 673442 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2024-1307)
  • 673924 EulerOS Security Update for tigervnc (EulerOS-SA-2024-1304)
  • 674012 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2024-1190)
  • 691052 Free Berkeley Software Distribution (FreeBSD) Security Update for xorg (6cc63bf5-a727-4155-8ec4-68b626475e68)
  • 710738 Gentoo Linux X.Org X server, XWayland Multiple Vulnerabilities (GLSA 202305-30)
  • 753627 SUSE Enterprise Linux Security Update for xorg-x11-server (SUSE-SU-2023:0282-1)
  • 753643 SUSE Enterprise Linux Security Update for xorg-x11-server (SUSE-SU-2023:0288-1)
  • 753644 SUSE Enterprise Linux Security Update for xorg-x11-server (SUSE-SU-2023:0287-1)
  • 753645 SUSE Enterprise Linux Security Update for xorg-x11-server (SUSE-SU-2023:0286-1)
  • 753648 SUSE Enterprise Linux Security Update for xorg-x11-server (SUSE-SU-2023:0285-1)
  • 940919 AlmaLinux Security Update for tigervnc (ALSA-2023:0662)
  • 940921 AlmaLinux Security Update for tigervnc (ALSA-2023:0622)
  • 941042 AlmaLinux Security Update for xorg-x11-server (ALSA-2023:2248)
  • 941062 AlmaLinux Security Update for xorg-x11-server-Xwayland (ALSA-2023:2249)
  • 941068 AlmaLinux Security Update for xorg-x11-server (ALSA-2023:2806)
  • 941119 AlmaLinux Security Update for xorg-x11-server-Xwayland (ALSA-2023:2805)
  • 960530 Rocky Linux Security Update for tigervnc (RLSA-2023:0622)
  • 960558 Rocky Linux Security Update for tigervnc (RLSA-2023:0662)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report