A vulnerability was found in X.Org. This issue occurs due to a dangling
pointer in DeepCopyPointerClasses that can be exploited by
ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into
freed memory. This can lead to local privilege elevation on systems where
the X server runs privileged and remote code execution for ssh X forwarding
sessions.
Author | Note |
---|---|
mdeslaur | xorg server is actually the xorg-server package the xorg package only contains docs xwayland package contains parts of xorg-server |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | xorg-server | < 2:1.19.6-1ubuntu4.14 | UNKNOWN |
ubuntu | 20.04 | noarch | xorg-server | < 2:1.20.13-1ubuntu1~20.04.6 | UNKNOWN |
ubuntu | 22.04 | noarch | xorg-server | < 2:21.1.3-2ubuntu2.7 | UNKNOWN |
ubuntu | 22.10 | noarch | xorg-server | < 2:21.1.4-2ubuntu1.5 | UNKNOWN |
ubuntu | 23.04 | noarch | xorg-server | < 2:21.1.7-1ubuntu1 | UNKNOWN |
ubuntu | 14.04 | noarch | xorg-server | < 2:1.15.1-0ubuntu2.11+esm7) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | xorg-server | < 2:1.18.4-0ubuntu0.12+esm5) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | xorg-server-hwe-16.04 | < 2:1.19.6-1ubuntu4.1~16.04.6+esm4) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | xorg-server-hwe-18.04 | < 2:1.20.8-2ubuntu2.2~18.04.10 | UNKNOWN |
ubuntu | 22.04 | noarch | xwayland | < 2:22.1.1-1ubuntu0.5 | UNKNOWN |