Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 669626 - x11-base/xorg-server: Privilege escalation and file overwrite in X.Org X server 1.19 and later (CVE-2018-14665)
Summary: x11-base/xorg-server: Privilege escalation and file overwrite in X.Org X serv...
Status: RESOLVED DUPLICATE of bug 669588
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://lists.x.org/archives/xorg-ann...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2018-10-25 20:08 UTC by Vlad K.
Modified: 2018-10-30 15:47 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Vlad K. 2018-10-25 20:08:29 UTC
* CVE-2018-14665

  https://lists.x.org/archives/xorg-announce/2018-October/002928.html

  xorg-server 1.20.3 announced: "Fixes CVE-2018-14665 (local file overwrite 
  bugs), and a trivial fix in fbdevhw initialization."
Comment 1 Vlad K. 2018-10-25 20:13:12 UTC
Oops, pasted wrong source url. Here's the advisory:

* Advisory:

  https://lists.x.org/archives/xorg-announce/2018-October/002927.html

  Incorrect command-line parameter validation in the Xorg X server can lead to
  privilege elevation and/or arbitrary files overwrite, when the X server is
  running with elevated privileges (ie when Xorg is installed with the setuid
  bit set and started by a non-root user).

  The -modulepath argument can be used to specify an insecure path to modules
  that are going to be loaded in the X server, allowing to execute unprivileged
  code in the privileged process.

  The -logfile argument can be used to overwrite arbitrary files in the file
  system, due to incorrect checks in the parsing of the option.

  This issue has been assigned CVE-2018-14665.

* Patch:

  https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e


--
Gentoo Security Scout
Vladimir Krstulja
Comment 2 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2018-10-25 20:26:34 UTC

*** This bug has been marked as a duplicate of bug 669588 ***
Comment 3 Thomas Deutschmann (RETIRED) gentoo-dev 2018-10-30 15:47:06 UTC
Freeing alias.