It is said that leveraging the vulnerability is possible from a remote SSH session. Say an attacker was able to successfully gain a remote SSH session in an untrusted VM, do you think it would be possible to gain full control through qubes' implementation of X.org?
I checked around and if I understand it right, qubes utilizes X.org in order to integrate the display of PVH VM applications to what the user can/must see.
Because of this, what's in my mind right now is that it's possible to leverage this vulnerability to gain full control but since I don't have an idea of the codes or how exactly qubes' implementation of X.org works, I would like to kindly ask for your thoughts about this matter.
Earlier I was about to remove setuid of Xorg but I thought it has a good chance of breaking my desktop environment altogether and that would be alot of trouble for me.
Each vm runs its own X server, which is already distrusted by dom0, so the chain would have to include an attack that works over vchan.
Future versions of qubes might default to wayland instead of X11, only because fedora probably will, and there wont be any reason to change that. appvms will probably continue to use X for a long time.
Your responses have added to my knowledge and ease with the Qubes OS. I am grateful for all this.