CVE Vulnerabilities

CVE-2023-5380

Use After Free

Published: Oct 25, 2023 | Modified: Nov 21, 2024
CVSS 3.x
4.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
4.7 MODERATE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

Name Vendor Start Version End Version
X_server X.org * 21.1.9 (excluding)
Xwayland X.org * 23.2.2 (excluding)
Red Hat Enterprise Linux 7 RedHat tigervnc-0:1.8.0-26.el7_9 *
Red Hat Enterprise Linux 8 RedHat xorg-x11-server-0:1.20.11-22.el8 *
Red Hat Enterprise Linux 8 RedHat tigervnc-0:1.13.1-8.el8 *
Red Hat Enterprise Linux 9 RedHat xorg-x11-server-0:1.20.11-24.el9 *
Red Hat Enterprise Linux 9 RedHat tigervnc-0:1.13.1-8.el9 *
Xorg Ubuntu bionic *
Xorg Ubuntu trusty *
Xorg Ubuntu xenial *
Xorg-server Ubuntu bionic *
Xorg-server Ubuntu devel *
Xorg-server Ubuntu esm-infra-legacy/trusty *
Xorg-server Ubuntu esm-infra/bionic *
Xorg-server Ubuntu esm-infra/focal *
Xorg-server Ubuntu esm-infra/xenial *
Xorg-server Ubuntu focal *
Xorg-server Ubuntu jammy *
Xorg-server Ubuntu lunar *
Xorg-server Ubuntu mantic *
Xorg-server Ubuntu noble *
Xorg-server Ubuntu oracular *
Xorg-server Ubuntu plucky *
Xorg-server Ubuntu trusty *
Xorg-server Ubuntu trusty/esm *
Xorg-server Ubuntu upstream *
Xorg-server Ubuntu xenial *
Xorg-server-hwe-16.04 Ubuntu xenial *
Xorg-server-hwe-18.04 Ubuntu bionic *
Xorg-server-lts-utopic Ubuntu trusty *
Xorg-server-lts-vivid Ubuntu trusty *
Xorg-server-lts-wily Ubuntu trusty *
Xorg-server-lts-xenial Ubuntu trusty *

Potential Mitigations

References