Article 41MR6 An X.Org security advisory

An X.Org security advisory

by
corbet
from LWN.net on (#41MR6)
It turn out that the X.org server, versions 1.19.0 and after, contain aneasily exploitable privilege escalation vulnerability. Anybody who isrunning a system that has X installed setuid root, and which has untrustedusers on it, will want to install the update. "X.Org recommends theuse of a display manager to start X sessions, which does not require Xorgto be installed setuid."
External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments