11-01-2018, 03:32 AM
Hi everyone! Hope you're all having a ice life!
Just found this article https://www.securepatterns.com/2018/10/c...erver.html while googling. I don't mean to raise any alarms whatsoever, just wondering whether this has been addressed...do we even have to worry about this issue?
From the article:
"X.org X Server application is vulnerable to privilege escalation issue. X.org X Server application allows lower privileged user to create or overwrite file anywhere on system , including files owned by privileged users (ex. /etc/shadow).
The attacker needs to have active console session to exploit this issue."
Just found this article https://www.securepatterns.com/2018/10/c...erver.html while googling. I don't mean to raise any alarms whatsoever, just wondering whether this has been addressed...do we even have to worry about this issue?
From the article:
"X.org X Server application is vulnerable to privilege escalation issue. X.org X Server application allows lower privileged user to create or overwrite file anywhere on system , including files owned by privileged users (ex. /etc/shadow).
The attacker needs to have active console session to exploit this issue."
Without each others help there ain't no hope for us
Need a translation service? https://www.deepl.com/es/translator
Need a translation service? https://www.deepl.com/es/translator