Security: Misconfigurations, European Commission, and X.Org Server Flaw
-
Misconfigurations are the most common modus operandi for hacks, says study
Misconfigurations are the most common modus operandi for hacks, says study "As we analyze the hacking landscape from 2019 to 2022, it's evident that the most prevalent forms of cyber attacks were misconfigurations and data breaches. Additionally, Ransomware remains a persistent threat, leveraging weak credentials to gain access to valuable data which can then be held for ransom. Other types of hacks, such as Social Engineering, Cyber Espionage, Insider Threats, Supply Chain Attacks, and Spear Phishing, pose significant risks to organizations and must be taken into consideration as part of a comprehensive security strategy," adds Tyagi.
-
Why the European Commission must consult the Open Source communities
-
X.Org Security Advisory: CVE-2023-1393: X.Org Server Overlay Window Use-After-Free
X.Org Security Advisory: March 29, 2023
X.Org Server Overlay Window Use-After-Free ==========================================
This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
ZDI-CAN-19866/CVE-2023-1393: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.
Patches ------- Patch for this issue have been committed to the xorg server git repository. xorg-server 21.1.8 will be released shortly and will include this patch.
- commit 26ef545b3 - composite: Fix use-after-free of the COW (https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3)
ZDI-CAN-19866/CVE-2023-1393
If a client explicitly destroys the compositor overlay window (aka COW), we would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.
Make sure to clear the CompScreen pointer to the COW when the latter gets destroyed explicitly by the client.