summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorWill Dietz <w@wdtz.org>2019-06-11 17:03:50 -0500
committerFrederik Rietdijk <freddyrietdijk@fridh.nl>2019-06-15 18:16:58 +0200
commit6d7cdd7f8b5b36c66de08ec0b0006d4c6f5d5f28 (patch)
tree71bd391d3d2137801d4d150acb6b165e5743be48 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parent40ff73327d60275457368a070cb39ef8bba2cf7e (diff)
dbus: 1.12.14 -> 1.12.16
https://gitlab.freedesktop.org/dbus/dbus/blob/dbus-1.12.16/NEWS It's short and explains the CVE a bit, including below: > CVE-2019-12749: Do not attempt to carry out DBUS_COOKIE_SHA1 > authentication for identities that differ from the user running the > DBusServer. Previously, a local attacker could manipulate symbolic > links in their own home directory to bypass authentication and connect > to a DBusServer with elevated privileges. The standard system and > session dbus-daemons in their default configuration were immune to this > attack because they did not allow DBUS_COOKIE_SHA1, but third-party > users of DBusServer such as Upstart could be vulnerable. Thanks to Joe > Vennix of Apple Information Security. (dbus#269, Simon McVittie)
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions