On 12/16/25 08:27, [email protected] wrote:
[...]

But this dbus/systemd thing is only meant as illustration; there are plenty
of other ways to (ab)use this; in particular, xwayland / recent linux distros
have gutted the X11 cookie auth, only relying on "si:localuser" (i.e. on
SO_PEERCRED checks) for authentication.

This looks to me like the problem here is systemd and wayland offering abusable endpoints and distributions intentionally weakening security.

Gutting X11 cookie auth is *completely* *inexcusable* in a networked environment.  Could that itself qualify for a CVE on all distributions that do it?


-- Jacob

Reply via email to