paul Posted September 1, 2006 Report Share Posted September 1, 2006 X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm, does not check the return values for setuid and seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail, such as by exceeding a ulimit. In practice, it is unlikely that these programs have any real-world vulnerability. The X binary is the only one shipped suid. Further analysis of the code in question shows that it's highly unlikely that this can be exploited. Patched updates are provided as a precaution nonetheless. Updated packages are patched to address this issue. Link to comment Share on other sites More sharing options...
Recommended Posts