Summary: | x11-base/xorg-server: Privilege escalation and file overwrite in X.Org X server 1.19 and later (CVE-2018-14665) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Vlad K. <vk-gentoo-bugs> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED DUPLICATE | ||
Severity: | normal | CC: | x11 |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://lists.x.org/archives/xorg-announce/2018-October/002927.html | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Vlad K.
2018-10-25 20:08:29 UTC
Oops, pasted wrong source url. Here's the advisory: * Advisory: https://lists.x.org/archives/xorg-announce/2018-October/002927.html Incorrect command-line parameter validation in the Xorg X server can lead to privilege elevation and/or arbitrary files overwrite, when the X server is running with elevated privileges (ie when Xorg is installed with the setuid bit set and started by a non-root user). The -modulepath argument can be used to specify an insecure path to modules that are going to be loaded in the X server, allowing to execute unprivileged code in the privileged process. The -logfile argument can be used to overwrite arbitrary files in the file system, due to incorrect checks in the parsing of the option. This issue has been assigned CVE-2018-14665. * Patch: https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e -- Gentoo Security Scout Vladimir Krstulja *** This bug has been marked as a duplicate of bug 669588 *** Freeing alias. |