diff options
| author | Will Dietz <w@wdtz.org> | 2019-06-11 17:03:50 -0500 |
|---|---|---|
| committer | Frederik Rietdijk <freddyrietdijk@fridh.nl> | 2019-06-15 18:16:58 +0200 |
| commit | 6d7cdd7f8b5b36c66de08ec0b0006d4c6f5d5f28 (patch) | |
| tree | 71bd391d3d2137801d4d150acb6b165e5743be48 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch | |
| parent | 40ff73327d60275457368a070cb39ef8bba2cf7e (diff) | |
dbus: 1.12.14 -> 1.12.16
https://gitlab.freedesktop.org/dbus/dbus/blob/dbus-1.12.16/NEWS
It's short and explains the CVE a bit, including below:
> CVE-2019-12749: Do not attempt to carry out DBUS_COOKIE_SHA1
> authentication for identities that differ from the user running the
> DBusServer. Previously, a local attacker could manipulate symbolic
> links in their own home directory to bypass authentication and connect
> to a DBusServer with elevated privileges. The standard system and
> session dbus-daemons in their default configuration were immune to this
> attack because they did not allow DBUS_COOKIE_SHA1, but third-party
> users of DBusServer such as Upstart could be vulnerable. Thanks to Joe
> Vennix of Apple Information Security. (dbus#269, Simon McVittie)
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions
