Security bump. Failure to check the return value of setuid() in a privileged process...
authorDonnie Berkholz <dberkholz@gentoo.org>
Tue, 20 Jun 2006 16:37:28 +0000 (16:37 +0000)
committerDonnie Berkholz <dberkholz@gentoo.org>
Tue, 20 Jun 2006 16:37:28 +0000 (16:37 +0000)
commitb68792a9c90c43eb8e92e008db96a2df1a197e03
tree974c1cebf7c0c496a0082210f9c38c31ff75ddba
parentca339ed06c130785aec7c3142f21a5aef3544f97
Security bump. Failure to check the return value of setuid() in a privileged process could be used by a local user for file overwriting and possible privilege escalation in corner cases. See lists.freedesktop.org/archives/xorg/2006-June/016146.html for more information.
Package-Manager: portage-2.1.1_pre1-r1
x11-base/xorg-server/ChangeLog
x11-base/xorg-server/files/digest-xorg-server-1.0.2-r6 [new file with mode: 0644]
x11-base/xorg-server/files/digest-xorg-server-1.1.0-r1 [new file with mode: 0644]
x11-base/xorg-server/files/x11r7.0-setuid.diff [new file with mode: 0644]
x11-base/xorg-server/files/xorg-server-1.1.0-setuid.diff [new file with mode: 0644]
x11-base/xorg-server/xorg-server-1.0.2-r6.ebuild [new file with mode: 0644]
x11-base/xorg-server/xorg-server-1.1.0-r1.ebuild [new file with mode: 0644]