Closed issue by Dieken on void-packages repository https://github.com/void-linux/void-packages/issues/43174 Description: https://github.com/void-linux/void-packages/blob/836b6c484e0b9de2f0f9b8ac2f646e99136e56e8/srcpkgs/xorg-server/template#L3 https://github.com/void-linux/void-packages/blob/836b6c484e0b9de2f0f9b8ac2f646e99136e56e8/srcpkgs/xorg-server-xwayland/template#L3 https://lwn.net/Articles/927887/ The X.Org project has [announced](https://lists.x.org/archives/xorg-announce/2023-March/003374.html) a vulnerability in its X server and Xwayland (CVE-2023-1393). > This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. > > [...] If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later. That has led to the release of [xorg-server 21.1.8](https://lists.x.org/archives/xorg-announce/2023-March/003377.html), [xwayland 22.1.9](https://lists.x.org/archives/xorg-announce/2023-March/003375.html), and [xwayland 23.1.1](https://lists.x.org/archives/xorg-announce/2023-March/003376.html).