mirror of
git://slackware.nl/current.git
synced 2024-12-31 10:28:29 +01:00
5b606a9169
patches/packages/glibc-zoneinfo-2023c-noarch-1_slack15.0.txz: Upgraded. This package provides the latest timezone updates. patches/packages/mozilla-thunderbird-102.9.1-x86_64-1_slack15.0.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/102.9.1/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-12/ https://www.cve.org/CVERecord?id=CVE-2023-28427 (* Security fix *) patches/packages/xorg-server-1.20.14-x86_64-8_slack15.0.txz: Rebuilt. [PATCH] composite: Fix use-after-free of the COW. Fix use-after-free that can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. For more information, see: https://lists.x.org/archives/xorg-announce/2023-March/003374.html https://www.cve.org/CVERecord?id=CVE-2023-1393 (* Security fix *) patches/packages/xorg-server-xephyr-1.20.14-x86_64-8_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xnest-1.20.14-x86_64-8_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xvfb-1.20.14-x86_64-8_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xwayland-21.1.4-x86_64-7_slack15.0.txz: Rebuilt. [PATCH] composite: Fix use-after-free of the COW. Fix use-after-free that can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. For more information, see: https://lists.x.org/archives/xorg-announce/2023-March/003374.html https://www.cve.org/CVERecord?id=CVE-2023-1393 (* Security fix *)
42 lines
1.4 KiB
Diff
42 lines
1.4 KiB
Diff
From 26ef545b3502f61ca722a7a3373507e88ef64110 Mon Sep 17 00:00:00 2001
|
|
From: Olivier Fourdan <ofourdan@redhat.com>
|
|
Date: Mon, 13 Mar 2023 11:08:47 +0100
|
|
Subject: [PATCH] composite: Fix use-after-free of the COW
|
|
|
|
ZDI-CAN-19866/CVE-2023-1393
|
|
|
|
If a client explicitly destroys the compositor overlay window (aka COW),
|
|
we would leave a dangling pointer to that window in the CompScreen
|
|
structure, which will trigger a use-after-free later.
|
|
|
|
Make sure to clear the CompScreen pointer to the COW when the latter gets
|
|
destroyed explicitly by the client.
|
|
|
|
This vulnerability was discovered by:
|
|
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
|
|
|
|
Signed-off-by: Olivier Fourdan <ofourdan@redhat.com>
|
|
Reviewed-by: Adam Jackson <ajax@redhat.com>
|
|
---
|
|
composite/compwindow.c | 5 +++++
|
|
1 file changed, 5 insertions(+)
|
|
|
|
diff --git a/composite/compwindow.c b/composite/compwindow.c
|
|
index 4e2494b86b..b30da589e9 100644
|
|
--- a/composite/compwindow.c
|
|
+++ b/composite/compwindow.c
|
|
@@ -620,6 +620,11 @@ compDestroyWindow(WindowPtr pWin)
|
|
ret = (*pScreen->DestroyWindow) (pWin);
|
|
cs->DestroyWindow = pScreen->DestroyWindow;
|
|
pScreen->DestroyWindow = compDestroyWindow;
|
|
+
|
|
+ /* Did we just destroy the overlay window? */
|
|
+ if (pWin == cs->pOverlayWin)
|
|
+ cs->pOverlayWin = NULL;
|
|
+
|
|
/* compCheckTree (pWin->drawable.pScreen); can't check -- tree isn't good*/
|
|
return ret;
|
|
}
|
|
--
|
|
GitLab
|
|
|