![]() ![]() Recent exploit would have been stopped cold for example. Make any attacks against it less potent or completely ineffective-the Reducing its privileges and possibly running it as a separate user ![]() ![]() Vulnerabilities in the past and almost certainly will be again in theįuture. Local and, potentially, from across the network. Is a complicated chunk of code that is exposed to all manner of attacks, both Root-privileged X servers for a good reason to want an unprivileged X. One need only look at the recent kernel hole that was exposed by There is another missing piece, at least for multi-user systems: some wayįor processes to enforce exclusive access to files they want to open. Running the X server as a non-privileged user. KMS has made its way intoĭistributions now, but for the most part there has been no switch to It would-finally-allow systems to rid themselves of an enormousīody of code running as root: the X server. One of the heralded features that was supposed to come with moving the graphics ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |