<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=5632&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / X.Org Security Advisory - 20230329]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=5632</link>
		<description><![CDATA[The most recent posts in X.Org Security Advisory - 20230329.]]></description>
		<lastBuildDate>Wed, 29 Mar 2023 13:20:09 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[X.Org Security Advisory - 20230329]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=41649#p41649</link>
			<description><![CDATA[<p>Hello:</p><p>Received this in my inbox this morning.</p><p>---</p><p>X.Org Security Advisory: March 29, 2023</p><p>X.Org Server Overlay Window Use-After-Free<br />==========================================</p><p>This issue can lead to local privileges elevation on systems where the X<br />server is running privileged and remote code execution for ssh X forwarding<br />sessions.</p><p>ZDI-CAN-19866/CVE-2023-1393: X.Org Server Overlay Window Use-After-Free<br />Local Privilege Escalation Vulnerability</p><p>If a client explicitly destroys the compositor overlay window (aka COW),<br />the Xserver would leave a dangling pointer to that window in the CompScreen<br />structure, which will trigger a use-after-free later.</p><p>Patches<br />-------<br />Patch for this issue have been committed to the xorg server git repository.<br />xorg-server 21.1.8 will be released shortly and will include this patch.</p><p>- commit 26ef545b3 - composite: Fix use-after-free of the COW<br />&#160; &#160;(<a href="https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3" rel="nofollow">https://gitlab.freedesktop.org/xorg/xse … /26ef545b3</a>)</p><p>ZDI-CAN-19866/CVE-2023-1393</p><p>If a client explicitly destroys the compositor overlay window (aka COW),<br />we would leave a dangling pointer to that window in the CompScreen<br />structure, which will trigger a use-after-free later.</p><p>Make sure to clear the CompScreen pointer to the COW when the latter gets<br />destroyed explicitly by the client.</p><p>Thanks<br />======</p><p>The vulnerabilities have been discovered by Jan-Niklas Sohn working with<br />Trend Micro Zero Day Initiative.</p><p>---</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Wed, 29 Mar 2023 13:20:09 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=41649#p41649</guid>
		</item>
	</channel>
</rss>
