Package: release.debian.org Severity: normal User: release.debian....@packages.debian.org Usertags: unblock X-Debbugs-Cc: jcris...@debian.org
Please unblock package xorg-server [ Reason ] CVE-2023-1393 [ Risks ] Simple patch to reset a pointer to freed memory. [ Checklist ] [x] all changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in testing unblock xorg-server/2:21.1.7-2 diff --git a/composite/compwindow.c b/composite/compwindow.c index 73a1871a0b..9a651636e3 100644 --- a/composite/compwindow.c +++ b/composite/compwindow.c @@ -620,6 +620,11 @@ compDestroyWindow(WindowPtr pWin) ret = (*pScreen->DestroyWindow) (pWin); cs->DestroyWindow = pScreen->DestroyWindow; pScreen->DestroyWindow = compDestroyWindow; + + /* Did we just destroy the overlay window? */ + if (pWin == cs->pOverlayWin) + cs->pOverlayWin = NULL; + /* compCheckTree (pWin->drawable.pScreen); can't check -- tree isn't good*/ return ret; } diff --git a/debian/changelog b/debian/changelog index 0949487831..f7e8a40cb5 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,10 @@ +xorg-server (2:21.1.7-2) unstable; urgency=high + + * composite: Fix use-after-free of the COW + ZDI-CAN-19866/CVE-2023-1393 + + -- Julien Cristau <jcris...@debian.org> Wed, 29 Mar 2023 15:11:07 +0200 + xorg-server (2:21.1.7-1) unstable; urgency=medium * New upstream release