--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: jcristau@debian.org
Please unblock package xorg-server
[ Reason ]
CVE-2023-1393
[ Risks ]
Simple patch to reset a pointer to freed memory.
[ Checklist ]
[x] all changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in testing
unblock xorg-server/2:21.1.7-2
diff --git a/composite/compwindow.c b/composite/compwindow.c
index 73a1871a0b..9a651636e3 100644
--- a/composite/compwindow.c
+++ b/composite/compwindow.c
@@ -620,6 +620,11 @@ compDestroyWindow(WindowPtr pWin)
ret = (*pScreen->DestroyWindow) (pWin);
cs->DestroyWindow = pScreen->DestroyWindow;
pScreen->DestroyWindow = compDestroyWindow;
+
+ /* Did we just destroy the overlay window? */
+ if (pWin == cs->pOverlayWin)
+ cs->pOverlayWin = NULL;
+
/* compCheckTree (pWin->drawable.pScreen); can't check -- tree isn't good*/
return ret;
}
diff --git a/debian/changelog b/debian/changelog
index 0949487831..f7e8a40cb5 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,10 @@
+xorg-server (2:21.1.7-2) unstable; urgency=high
+
+ * composite: Fix use-after-free of the COW
+ ZDI-CAN-19866/CVE-2023-1393
+
+ -- Julien Cristau <jcristau@debian.org> Wed, 29 Mar 2023 15:11:07 +0200
+
xorg-server (2:21.1.7-1) unstable; urgency=medium
* New upstream release
--- End Message ---