Navigation
Recherche
|
An X.Org security advisory
vendredi 26 octobre 2018, 15:37 , par LWN.net
It turn out that the X.org server, versions 1.19.0 and after, contain an
easily exploitable privilege escalation vulnerability. Anybody who is running a system that has X installed setuid root, and which has untrusted users on it, will want to install the update. 'X.Org recommends the use of a display manager to start X sessions, which does not require Xorg to be installed setuid.'
https://lwn.net/Articles/769577/rss
|
56 sources (32 en français)
Date Actuelle
jeu. 21 nov. - 15:50 CET
|