A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.
References
Configurations
History
29 Aug 2025, 13:42
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
X.org x Server
|
|
| CPE | cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:* |
21 Nov 2024, 07:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110 - Patch | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/ - | |
| References | () https://security.gentoo.org/glsa/202305-30 - Third Party Advisory | |
| References | () https://www.openwall.com/lists/oss-security/2023/03/29/1 - Mailing List, Third Party Advisory |
02 Aug 2023, 17:04
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110 - Patch | |
| References | (GENTOO) https://security.gentoo.org/glsa/202305-30 - Third Party Advisory |
23 Jul 2023, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
30 May 2023, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
20 Apr 2023, 14:40
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
|
| CWE | CWE-416 | |
| References |
|
|
| References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/ - Mailing List, Third Party Advisory | |
| References | (MISC) https://www.openwall.com/lists/oss-security/2023/03/29/1 - Mailing List, Third Party Advisory |
31 Mar 2023, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
30 Mar 2023, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-03-30 21:15
Updated : 2025-08-29 13:42
NVD link : CVE-2023-1393
Mitre link : CVE-2023-1393
CVE.ORG link : CVE-2023-1393
JSON object : View
Products Affected
fedoraproject
- fedora
x.org
- x_server
CWE
CWE-416
Use After Free
