Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:0288-1

Опубликовано: 07 фев. 2023
Источник: suse-cvrf

Описание

Security update for xorg-x11-server

This update for xorg-x11-server fixes the following issues:

  • CVE-2023-0494: Fixed a use-after-free in DeepCopyPointerClasses (bsc#1207783).

Список пакетов

Image SLES15-SP4-SAP
xorg-x11-server-1.20.3-150400.38.16.1
Image SLES15-SP4-SAP-Azure
xorg-x11-server-1.20.3-150400.38.16.1
Image SLES15-SP4-SAP-EC2
xorg-x11-server-1.20.3-150400.38.16.1
Image SLES15-SP4-SAP-GCE
xorg-x11-server-1.20.3-150400.38.16.1
Image SLES15-SP4-SAPCAL
xorg-x11-server-1.20.3-150400.38.16.1
Image SLES15-SP4-SAPCAL-Azure
xorg-x11-server-1.20.3-150400.38.16.1
Image SLES15-SP4-SAPCAL-EC2
xorg-x11-server-1.20.3-150400.38.16.1
Image SLES15-SP4-SAPCAL-GCE
xorg-x11-server-1.20.3-150400.38.16.1
SUSE Linux Enterprise Module for Basesystem 15 SP4
xorg-x11-server-1.20.3-150400.38.16.1
xorg-x11-server-extra-1.20.3-150400.38.16.1
SUSE Linux Enterprise Module for Development Tools 15 SP4
xorg-x11-server-sdk-1.20.3-150400.38.16.1
openSUSE Leap 15.4
xorg-x11-server-1.20.3-150400.38.16.1
xorg-x11-server-extra-1.20.3-150400.38.16.1
xorg-x11-server-sdk-1.20.3-150400.38.16.1
xorg-x11-server-source-1.20.3-150400.38.16.1

Описание

A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.


Затронутые продукты
Image SLES15-SP4-SAP-Azure:xorg-x11-server-1.20.3-150400.38.16.1
Image SLES15-SP4-SAP-EC2:xorg-x11-server-1.20.3-150400.38.16.1
Image SLES15-SP4-SAP-GCE:xorg-x11-server-1.20.3-150400.38.16.1
Image SLES15-SP4-SAP:xorg-x11-server-1.20.3-150400.38.16.1

Ссылки