Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Oct 2018 20:47:06 -0700
From:      Pete Wright <pete@nomadlogic.org>
To:        Gladiola <gladiola@protonmail.com>, x11 <x11@freebsd.org>
Subject:   Re: Check your xorg version number.
Message-ID:  <d8853953-2c4e-bc3c-6f70-a126906acaef@nomadlogic.org>
In-Reply-To: <tkKSQm498efG8O5w78ERg822u4apuOmH2uHejnLalnre_pUgfCF3UTZJk0FSyz4TBbqH-6JLFz2iFnbdHmYD1V8_wYhRKVKilJ7J4owVhC0=@protonmail.com>
References:  <tkKSQm498efG8O5w78ERg822u4apuOmH2uHejnLalnre_pUgfCF3UTZJk0FSyz4TBbqH-6JLFz2iFnbdHmYD1V8_wYhRKVKilJ7J4owVhC0=@protonmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help

On 10/25/18 7:19 PM, Gladiola via freebsd-x11 wrote:
> Maintainers:
>
> https://twitter.com/hackerfantastic/status/1055555359060807680?s=19
>
> https://nvd.nist.gov/vuln/detail/CVE-2018-14685

that CVE entry seems to correspond to a PHP issue unless i'm missing 
something.

perhaps this is what you are referring to:
https://lists.x.org/archives/xorg-announce/2018-October/002927.html

yea this is really not a good thing, although i believe we are 
accidentally OK since we are not running xorg-1.19.x yet in the ports tree:

"Privilege escalation and file overwrite in X.Org X server 1.19 and later"

regardless of that line I believe others on this list are looking 
closely into this regardless.

-pete


-- 
Pete Wright
pete@nomadlogic.org
@nomadlogicLA




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?d8853953-2c4e-bc3c-6f70-a126906acaef>