Security bump. Failure to check the return value of setuid() in a privileged process...
authorDonnie Berkholz <dberkholz@gentoo.org>
Tue, 20 Jun 2006 20:00:51 +0000 (20:00 +0000)
committerDonnie Berkholz <dberkholz@gentoo.org>
Tue, 20 Jun 2006 20:00:51 +0000 (20:00 +0000)
commit69a2c0465da33d707426cfba2dd1c205a4a79c7c
tree5e5596e7fca2008dd914aef9ea08a0e74949ae99
parent31a7eb9737dc3d914eeb5700799d6adda4f082cd
Security bump. Failure to check the return value of setuid() in a privileged process could be used by a local user for file overwriting and possible privilege escalation in corner cases. See lists.freedesktop.org/archives/xorg/2006-June/016146.html for more information.
Package-Manager: portage-2.1.1_pre1-r1
x11-base/xorg-x11/ChangeLog
x11-base/xorg-x11/files/digest-xorg-x11-6.8.2-r8 [new file with mode: 0644]
x11-base/xorg-x11/files/digest-xorg-x11-6.9.0-r2 [new file with mode: 0644]
x11-base/xorg-x11/files/x11r6.9.0-setuid.diff [new file with mode: 0644]
x11-base/xorg-x11/files/xorg-68x-setuid.patch [new file with mode: 0644]
x11-base/xorg-x11/xorg-x11-6.8.2-r8.ebuild [new file with mode: 0644]
x11-base/xorg-x11/xorg-x11-6.9.0-r2.ebuild [new file with mode: 0644]