Local Privilege Escalation Vulnerability Affecting X.Org Server For 18 Years
Local Privilege Escalation Vulnerability Affecting X.Org Server For 18 Years
Lol not even reading it because I've always assumed that if there's an RCE on desktop it will inevitably lead to full system compromise.
😅
It's trust all the way down.
3 0 ReplyIs this news worthy? X is the classic example of how a code base becomes completely unmanageable
9 0 ReplyI love the link thumbnail!
16 0 ReplyBy providing a modified bitmap to the X.Org Server, a heap-based buffer overflow privilege escalation can occur.
Maybe we should stop writing security critical software in memory unsafe languages. I now this vulnerability was introduced a long time ago, but given that major Wayland compositors are still written in C, something like this isn't too unlikely to happen again.
4 0 ReplyWait till bro find out the program written in the "memory safe language" depends on many libraries written in C
7 0 ReplyThe problem is a huge codebase that no one understands.
5 0 ReplyLet's re-write all currently existing software in Rust, then there will be no more security holes, and every computer will be safe forever.
12 0 Replymajor Wayland compositors are still written in C
KWin is written in C++ but yes, it's not a "safe" language.
something like this isn’t too unlikely to happen again.
With at least three mainstream implementations – KWin, Mutter, and wlroots – it's highly unlikely that all would ever be equally affected by one bug.
4 0 Reply
I know Phoronix comments, but what's up with the Linux Mint hate?
2 0 ReplyTbf, there's 1 Mint comment and 1 reply to that comment.
4 0 Reply