Jump to content

Advisories MDKSA-2006:160: Updated xorg-x11/XFree86 packages fix potential vulnerabilities


paul
 Share

Recommended Posts

X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload,

xtrans, and xterm, does not check the return values for setuid and

seteuid calls when attempting to drop privileges, which might allow

local users to gain privileges by causing those calls to fail, such as

by exceeding a ulimit.

 

In practice, it is unlikely that these programs have any real-world

vulnerability. The X binary is the only one shipped suid. Further

analysis of the code in question shows that it's highly unlikely that

this can be exploited. Patched updates are provided as a precaution

nonetheless.

 

Updated packages are patched to address this issue.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...