diff -u xorg-server-1.20.13/debian/changelog xorg-server-1.20.13/debian/changelog --- xorg-server-1.20.13/debian/changelog +++ xorg-server-1.20.13/debian/changelog @@ -1,3 +1,12 @@ +xorg-server (2:1.20.13-1ubuntu1~20.04.6) focal-security; urgency=medium + + * SECURITY UPDATE: DeepCopyPointerClasses use-after-free + - debian/patches/CVE-2023-0494.patch: fix potential use-after-free in + Xi/exevents.c. + - CVE-2023-0494 + + -- Marc Deslauriers Tue, 07 Feb 2023 07:48:13 -0500 + xorg-server (2:1.20.13-1ubuntu1~20.04.5) focal-security; urgency=medium * SECURITY UPDATE: XTestSwapFakeInput stack overflow diff -u xorg-server-1.20.13/debian/patches/series xorg-server-1.20.13/debian/patches/series --- xorg-server-1.20.13/debian/patches/series +++ xorg-server-1.20.13/debian/patches/series @@ -48,0 +49 @@ +CVE-2023-0494.patch only in patch2: unchanged: --- xorg-server-1.20.13.orig/debian/patches/CVE-2023-0494.patch +++ xorg-server-1.20.13/debian/patches/CVE-2023-0494.patch @@ -0,0 +1,29 @@ +From 0ba6d8c37071131a49790243cdac55392ecf71ec Mon Sep 17 00:00:00 2001 +From: Peter Hutterer +Date: Wed, 25 Jan 2023 11:41:40 +1000 +Subject: [PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses + +CVE-2023-0494, ZDI-CAN-19596 + +This vulnerability was discovered by: +Jan-Niklas Sohn working with Trend Micro Zero Day Initiative + +Signed-off-by: Peter Hutterer +--- + Xi/exevents.c | 4 +++- + 1 file changed, 3 insertions(+), 1 deletion(-) + +--- a/Xi/exevents.c ++++ b/Xi/exevents.c +@@ -575,8 +575,10 @@ DeepCopyPointerClasses(DeviceIntPtr from + memcpy(to->button->xkb_acts, from->button->xkb_acts, + sizeof(XkbAction)); + } +- else ++ else { + free(to->button->xkb_acts); ++ to->button->xkb_acts = NULL; ++ } + + memcpy(to->button->labels, from->button->labels, + from->button->numButtons * sizeof(Atom));