In X.Org Server (aka xserver and xorg-server) before 1.19.4, an attacker authenticated to an X server with the X shared memory extension enabled can cause aborts of the X server or replace shared memory segments of other X clients in the same session.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1 | third party advisory |
https://security.gentoo.org/glsa/201710-30 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2017/10/04/10 | third party advisory mailing list |
http://www.securityfocus.com/bid/101238 | vdb entry third party advisory |
http://www.debian.org/security/2017/dsa-4000 | third party advisory vendor advisory |
https://lists.x.org/archives/xorg-announce/2017-October/002808.html | mailing list vendor advisory |